source: vendor/current/selftest/knownfail@ 989

Last change on this file since 989 was 989, checked in by Silvan Scherrer, 9 years ago

Samba Server: update vendor to version 4.4.7

File size: 18.2 KB
Line 
1# This file contains a list of regular expressions matching the names of
2# tests that are expected to fail.
3#
4# "make test" will not report failures for tests listed here and will consider
5# a successful run for any of these tests an error.
6
7^samba3.blackbox.failure.failure # this is designed to fail, for testing our test infrastructure
8.*driver.add_driver_timestamps # we only can store dates, not timestamps
9^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).LOCK9 # Fails against the s4 ntvfs server
10^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).OPLOCK2 # Fails against the s4 ntvfs server
11^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).STREAMERROR # Fails against the s4 ntvfs server
12^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).DIR1 # Fails against the s4 ntvfs server
13^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).DIR-CREATETIME # Fails against the s4 ntvfs server
14^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).DELETE-LN # Fails against the s4 ntvfs server
15^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX # Fails against the s4 ntvfs server
16^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).UID-REGRESSION-TEST # Fails against the s4 ntvfs server
17^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SHORTNAME-TEST # Fails against the s4 ntvfs server
18^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX-APPEND # Fails against the s4 ntvfs server
19^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX-SYMLINK-ACL # Fails against the s4 ntvfs server
20^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).POSIX-SYMLINK-EA # Fails against the s4 ntvfs server
21^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).NTTRANS-FSCTL # Fails against the s4 ntvfs server
22^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SMB2-NEGPROT # Fails against the s4 ntvfs server
23^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).BAD-NBT-SESSION # Fails against the s4 ntvfs server
24^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SMB2-SESSION-REAUTH # Fails against the s4 ntvfs server
25^samba3.smbtorture_s3.plain\(ad_dc_ntvfs\).SMB2-SESSION-RECONNECT # Fails against the s4 ntvfs server
26 ^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-REAUTH # expected to give ACCESS_DENIED SMB2.1 doesn't have encryption
27^samba3.smbtorture_s3.crypt_server\(nt4_dc\).SMB2-SESSION-RECONNECT # expected to give CONNECTION_DISCONNECTED, we need to fix the test
28^samba3.smb2.session enc.reconnect # expected to give CONNECTION_DISCONNECTED, we need to fix the test
29^samba3.raw.session enc # expected to give ACCESS_DENIED as SMB1 encryption isn't used
30^samba3.smbtorture_s3.crypt_server # expected to give ACCESS_DENIED as SMB1 encryption isn't used
31^samba3.nbt.dgram.*netlogon2\(nt4_dc\)
32^samba3.*rap.sam.*.useradd # Not provided by Samba 3
33^samba3.*rap.sam.*.userdelete # Not provided by Samba 3
34^samba3.libsmbclient.opendir # This requires a workgroup called 'WORKGROUP' and for netbios browse lists to have been registered
35# see bug 8412
36^samba3.smb2.rename.*.simple_nodelete
37^samba3.smb2.rename.*.no_share_delete_no_delete_access
38^samba3.blackbox.smbclient_machine_auth.plain \(nt4_dc:local\)# the NT4 DC does not currently set up a self-join
39^samba3.raw.samba3hide.samba3hide\((nt4_dc|ad_dc)\) # This test fails against an smbd environment with NT ACLs enabled
40^samba3.raw.samba3closeerr.samba3closeerr\(nt4_dc\) # This test fails against an smbd environment with NT ACLs enabled
41^samba3.raw.acls nfs4acl_xattr-simple.INHERITFLAGS\(nt4_dc\) # This (and the follow nfs4acl_xattr tests fail because our NFSv4 backend isn't a complete mapping yet.
42^samba3.raw.acls nfs4acl_xattr-simple.sd\(nt4_dc\)
43^samba3.raw.acls nfs4acl_xattr-simple.create_file\(nt4_dc\)
44^samba3.raw.acls nfs4acl_xattr-simple.create_dir\(nt4_dc\)
45^samba3.raw.acls nfs4acl_xattr-simple.nulldacl\(nt4_dc\)
46^samba3.raw.acls nfs4acl_xattr-simple.generic\(nt4_dc\)
47^samba3.raw.acls nfs4acl_xattr-simple.inheritance\(nt4_dc\)
48^samba3.raw.acls nfs4acl_xattr-special.INHERITFLAGS\(nt4_dc\)
49^samba3.raw.acls nfs4acl_xattr-special.sd\(nt4_dc\)
50^samba3.raw.acls nfs4acl_xattr-special.create_file\(nt4_dc\)
51^samba3.raw.acls nfs4acl_xattr-special.create_dir\(nt4_dc\)
52^samba3.raw.acls nfs4acl_xattr-special.nulldacl\(nt4_dc\)
53^samba3.raw.acls nfs4acl_xattr-special.generic\(nt4_dc\)
54^samba3.raw.acls nfs4acl_xattr-special.inheritance\(nt4_dc\)
55^samba3.raw.acls nfs4acl_xattr-special.inherit_creator_owner\(nt4_dc\)
56^samba3.raw.acls nfs4acl_xattr-special.inherit_creator_group\(nt4_dc\)
57^samba3.base.delete.deltest16a
58^samba3.base.delete.deltest17a
59^samba3.unix.whoami anonymous connection.whoami\(ad_dc\) # We need to resolve if we should be including SID_NT_WORLD and SID_NT_NETWORK in this token
60^samba3.unix.whoami anonymous connection.whoami\(ad_member\) # smbd maps anonymous logins to domain guest in the local domain, not SID_NT_ANONYMOUS
61# these show that we still have some differences between our system
62# with our internal iconv because it passes except when we bypass our
63# internal iconv modules
64^samba4.local.convert_string_handle.system.iconv.gd_ascii
65^samba4.local.convert_string_handle.system.iconv.gd_iso8859_cp850
66^samba4..*base.delete.*.deltest17\(
67^samba4..*base.delete.*.deltest17b
68^samba4..*base.delete.*.deltest17c
69^samba4..*base.delete.*.deltest17e
70^samba4..*base.delete.*.deltest17f
71^samba4..*base.delete.*.deltest20a
72^samba4..*base.delete.*.deltest20b
73^samba4.raw.session.reauth
74^samba4.raw.session.expire1
75^samba4.raw.rename.*.osxrename
76^samba4.raw.rename.*.directory rename
77^samba4.raw.eas
78^samba4.rpc.winreg.*security
79^samba4.local.registry.(dir|ldb).check hive security
80^samba4.local.registry.local.security
81^samba4.rpc.wkssvc
82^samba4.rpc.handles.*.lsarpc-shared
83^samba4.rpc.epmapper
84^samba4.rpc.lsalookup on ncalrpc
85^samba4.rpc.lsalookup on ncacn_np
86^samba4.rpc.lsalookup with seal,padcheck
87^samba4.rpc.lsalookup with validate
88^samba4.rpc.lsalookup with bigendian
89^samba4.rpc.lsa on ncacn_np with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
90^samba4.rpc.lsa with seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
91^samba4.rpc.lsa.secrets.*seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
92^samba4.rpc.netlogon.*.LogonUasLogon
93^samba4.rpc.netlogon.*.LogonUasLogoff
94^samba4.rpc.netlogon.*.DatabaseSync
95^samba4.rpc.netlogon.*.DatabaseSync2
96^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomains
97^samba4.rpc.netlogon.*.NetrEnumerateTrustedDomainsEx
98^samba4.rpc.netlogon.*.GetPassword
99^samba4.rpc.netlogon.*.DatabaseRedo
100^samba4.rpc.drsuapi.*ncacn_ip_tcp.*validate # should only work with seal
101^samba4.rpc.drsuapi.*ncacn_ip_tcp.*bigendian # should only work with seal
102^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.validate # should only work with seal
103^samba4.rpc.samr.passwords.validate.*ncacn_ip_tcp.*with.bigendian # should only work with seal
104^samba4.base.charset.*.Testing partial surrogate
105^samba4.*.base.maximum_allowed # broken until we implement NTCREATEX_OPTIONS_BACKUP_INTENT
106.*net.api.delshare.* # DelShare isn't implemented yet
107^samba4.rap.*netservergetinfo
108^samba4.rap.*netsessionenum
109^samba4.rap.*netsessiongetinfo
110^samba4.rap.*netremotetod
111# SMB2 in s4 does not seem to support rename correctly
112^samba4.smb2.rename.simple\(.*\)$
113^samba4.smb2.rename.no_sharing\(.*\)$
114^samba4.smb2.rename.share_delete_and_delete_access\(.*\)$
115^samba4.smb2.rename.no_share_delete_but_delete_access\(.*\)$
116^samba4.smb2.rename.share_delete_no_delete_access\(.*\)$
117^samba4.smb2.rename.no_share_delete_no_delete_access\(.*\)$
118^samba4.smb2.rename.msword
119^samba4.smb2.rename.rename_dir_bench\(ad_dc_ntvfs\)
120^samba4.smb2.rename.rename_dir_openfile\(.*\)$
121^samba4.smb2.oplock.doc
122^samba4.smb2.compound.related3
123^samba4.smb2.compound.compound-break
124^samba4.smb2.lock.valid-request
125^samba4.*base.delaywrite.*update of write time and SMBwrite truncate\(.*\)$
126^samba4.*base.delaywrite.*update of write time and SMBwrite truncate expand\(.*\)$
127^samba4.*base.delaywrite.*delayed update of write time 3a\(.*\)$
128^samba4.*base.delaywrite.*delayed update of write time 3c\(.*\)$
129^samba4.*base.delaywrite.*update of write time using SET_END_OF_FILE\(.*\)$
130^samba4.*base.delaywrite.*update of write time using SET_ALLOCATION_SIZE\(.*\)$
131^samba4.*base.delaywrite.*directory timestamp update test\(.*\)$
132^samba4.ldap.python \(ad_dc_ntvfs\).Test add_ldif\(\) with BASE64 security descriptor input using WRONG domain SID\(.*\)$
133# some operations don't work over the CIFS NTVFS backend yet (eg. root_fid)
134^samba4.ntvfs.cifs.*.base.createx_sharemodes_dir
135^samba4.raw.lock.*.async # bug 6960
136^samba4.raw.open.ntcreatex_supersede
137^samba4.smb2.lock.*.multiple-unlock # bug 6959
138^samba4.raw.sfileinfo.*.end-of-file\(.*\)$ # bug 6962
139^samba4.raw.oplock.*.batch22 # bug 6963
140^samba4.raw.oplock.*.doc1
141^samba4.raw.oplock.*.exclusive5
142^samba4.raw.oplock.*.exclusive9
143^samba4.raw.oplock.*.level_ii_1
144^samba4.raw.lock.*.zerobyteread # bug 6974
145^samba4.smb2.lock.*.zerobyteread # bug 6974
146^samba4.raw.streams.*.delete
147^samba4.raw.streams.*.createdisp
148^samba4.raw.streams.*.sumtab
149^samba4.raw.streams.*.perms
150^samba4.raw.acls.INHERITFLAGS
151^samba4.raw.acls.*.create_dir
152^samba4.raw.acls.*.create_file
153^samba4.smb2.create.*.acldir
154^samba4.smb2.create.*.impersonation
155^samba4.smb2.acls.*.generic
156^samba4.smb2.acls.*.inheritflags
157^samba4.smb2.acls.*.owner
158^samba4.smb2.acls.*.ACCESSBASED
159^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.test_dirsync_deleted_items
160#^samba4.ldap.dirsync.python.ad_dc_ntvfs..__main__.ExtendedDirsyncTests.*
161^samba4.libsmbclient.opendir.opendir # This requires netbios browsing
162^samba4.rpc.drsuapi.*.drsuapi.DsGetDomainControllerInfo\(.*\)$
163^samba4.smb2.oplock.exclusive2\(.*\)$ # samba 4 oplocks are a mess
164^samba4.smb2.oplock.exclusive5\(.*\)$ # samba 4 oplocks are a mess
165^samba4.smb2.oplock.exclusive6\(.*\)$ # samba 4 oplocks are a mess
166^samba4.smb2.oplock.exclusive9\(.*\)$
167^samba4.smb2.oplock.brl3\(.*\)$ # samba 4 oplocks are a mess
168^samba4.smb2.oplock.levelii500\(.*\)$ # samba 4 oplocks are a mess
169^samba4.smb2.oplock.brl1\(.*\)$ # samba 4 oplocks are a mess
170^samba4.smb2.oplock.batch22\(.*\)$ # samba 4 oplocks are a mess
171^samba4.smb2.oplock.batch19\(.*\)$ # samba 4 oplocks are a mess
172^samba4.smb2.oplock.batch12\(.*\)$ # samba 4 oplocks are a mess
173^samba4.smb2.oplock.batch11\(.*\)$ # samba 4 oplocks are a mess
174^samba4.smb2.oplock.batch1\(.*\)$ # samba 4 oplocks are a mess
175^samba4.smb2.oplock.batch6\(.*\)$ # samba 4 oplocks are a mess
176^samba4.smb2.oplock.batch9\(.*\)$ # samba 4 oplocks are a mess
177^samba4.smb2.oplock.batch9a\(.*\)$ # samba 4 oplocks are a mess
178^samba4.smb2.oplock.batch10\(.*\)$ # samba 4 oplocks are a mess
179^samba4.smb2.oplock.batch20\(.*\)$ # samba 4 oplocks are a mess
180^samba4.smb2.oplock.batch26\(.*\)$
181^samba4.smb2.oplock.stream1 # samba 4 oplocks are a mess
182^samba4.smb2.getinfo.complex # streams on directories does not work
183^samba4.smb2.getinfo.qfs_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
184^samba4.smb2.getinfo.qfile_buffercheck # S4 does not do the INFO_LENGTH_MISMATCH/BUFFER_OVERFLOW thingy
185^samba4.smb2.getinfo.qsec_buffercheck # S4 does not do the BUFFER_TOO_SMALL thingy
186^samba4.ntvfs.cifs.krb5.base.createx_access.createx_access\(.*\)$
187^samba4.rpc.lsa.forest.trust #Not fully provided by Samba4
188^samba4.blackbox.kinit\(.*\).kinit with user password for expired password\(.*\) # We need to work out why this fails only during the pw change
189^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
190^samba4.blackbox.upgradeprovision.alpha13.ldapcmp_full_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
191^samba4.blackbox.upgradeprovision.release-4-0-0.ldapcmp_sd\(none\) # Due to something rewriting the NT ACL on DNS objects
192^samba4.raw.read.readx\(ad_dc_ntvfs\) # fails readx 16bit alignment requirement
193^samba3.smb2.create.gentest
194^samba3.smb2.create.blob
195^samba3.smb2.create.open
196^samba3.smb2.notify.valid-req
197^samba3.smb2.notify.rec
198^samba3.smb2.durable-open.delete_on_close2
199^samba3.smb2.durable-v2-open.app-instance
200^samba4.smb2.ioctl.req_resume_key\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
201^samba4.smb2.ioctl.copy_chunk_\w*\(ad_dc_ntvfs\) # not supported by s4 ntvfs server
202^samba3.smb2.dir.one
203^samba3.smb2.dir.modify
204^samba3.smb2.oplock.batch20
205^samba3.smb2.oplock.stream1
206^samba3.smb2.streams.rename
207^samba3.smb2.streams.rename2
208^samba3.smb2.streams.attributes
209^samba3.smb2.getinfo.complex
210^samba3.smb2.getinfo.fsinfo # quotas don't work yet
211^samba3.smb2.setinfo.setinfo
212^samba3.smb2.session.*reauth5 # some special anonymous checks?
213^samba3.smb2.compound.interim2 # wrong return code (STATUS_CANCELLED)
214^samba3.smb2.replay.channel-sequence
215^samba3.smb2.replay.replay3
216^samba3.smb2.replay.replay4
217^samba3.smb2.lock.*replay
218^samba4.smb2.ioctl.compress_notsup.*\(ad_dc_ntvfs\)
219^samba3.raw.session.*reauth2 # maybe fix this?
220^samba3.rpc.lsa.secrets.seal # This gives NT_STATUS_LOCAL_USER_SESSION_KEY
221^samba3.rpc.samr.passwords.badpwdcount.samr.badPwdCount\(nt4_dc\) # We fail this test currently
222^samba3.rpc.samr.passwords.lockout.*\(nt4_dc\)$ # We fail this test currently
223^samba3.rpc.spoolss.printer.addprinter.driver_info_winreg # knownfail or flapping?
224^samba3.rpc.spoolss.printer.addprinterex.driver_info_winreg # knownfail or flapping?
225^samba3.rpc.spoolss.printer.*.publish_toggle\(.*\)$ # needs spoolss AD member env
226^samba3.rpc.spoolss.printserver.*.add_processor\(.*\)$
227^samba4.rpc.fsrvp # fsrvp server only provided by smbd
228#
229# The following tests fail against ad_dc (aka s3fs) currently.
230# These need to be examined and either fixed or correctly categorised.
231# but in the interests of ensuring we do not regress, we run the tests
232# and list the current failures here.
233#
234^samba3.rpc.eventlog.eventlog.GetLogIntormation\(ad_dc\)
235^samba3.rpc.eventlog.eventlog.FlushEventLog\(ad_dc\)
236^samba3.rpc.eventlog.eventlog.ReportEventLog\(ad_dc\)
237^samba3.rpc.eventlog.eventlog.ReadEventLog\(ad_dc\)
238^samba3.rpc.eventlog.eventlog.GetNumRecords\(ad_dc\)
239^samba3.rpc.eventlog.eventlog.OpenEventLog\(ad_dc\)
240^samba3.rap.basic.netsessiongetinfo\(ad_dc\)
241#
242# This makes less sense when not running against an AD DC
243#
244^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member
245^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member
246^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping
247^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping
248^samba.wbinfo_simple.\(ad_dc_ntvfs:local\).--allocate-uid
249^samba.wbinfo_simple.\(ad_dc_ntvfs:local\).--allocate-gid
250^samba.wbinfo_simple.\(s4member:local\).--allocate-uid
251^samba.wbinfo_simple.\(s4member:local\).--allocate-gid
252^samba.wbinfo_simple.\(ad_dc:local\).--allocate-uid
253^samba.wbinfo_simple.\(ad_dc:local\).--allocate-gid
254^samba.wbinfo_simple.\(chgdcpass:local\).--allocate-uid
255^samba.wbinfo_simple.\(chgdcpass:local\).--allocate-gid
256#
257# These do not work against winbindd in member mode for unknown reasons
258#
259^samba4.winbind.struct.domain_info\(s4member:local\)
260^samba4.winbind.struct.getdcname\(s4member:local\)
261^samba.blackbox.wbinfo\(s4member:local\).wbinfo -r against s4member\(s4member:local\)
262^samba.blackbox.wbinfo\(s4member:local\).wbinfo --user-sids against s4member\(s4member:local\)
263^samba.wbinfo_simple.\(s4member:local\).--user-groups
264^samba.nss.test using winbind\(s4member:local\)
265#
266# These fail since ad_dc_ntvfs assigns the local user's uid to SAMBADOMAIN/Administrator
267# hence we have a duplicate UID in nsswitch.
268#
269^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc_ntvfs:local\)
270^samba3.local.nss.reentrant enumeration\(ad_dc_ntvfs:local\)
271^samba3.local.nss.enumeration\(ad_dc_ntvfs:local\)
272^samba3.local.nss.reentrant enumeration crosschecks\(ad_dc:local\)
273^samba3.local.nss.reentrant enumeration\(ad_dc:local\)
274^samba3.local.nss.enumeration\(ad_dc:local\)
275#
276# These fail only if we run the unix.whoami test before them
277# in the member and ad_member environments. ==> Strange!!!
278#
279^samba3.local.nss.reentrant enumeration crosschecks\(ad_member:local\)
280^samba3.local.nss.reentrant enumeration\(ad_member:local\)
281^samba3.local.nss.enumeration\(ad_member:local\)
282#
283# These do not work against winbindd in member mode for unknown reasons
284#
285^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U against ad_member\(ad_member:local\)
286^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -U check for sane mapping\(ad_member:local\)
287^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G against ad_member\(ad_member:local\)
288^samba.blackbox.wbinfo\(ad_member:local\).wbinfo -G check for sane mapping\(ad_member:local\)
289^samba4.winbind.struct.getdcname\(ad_member:local\)
290^samba4.winbind.struct.lookup_name_sid\(ad_member:local\)
291^samba4.winbind.struct.getdcname\(nt4_member:local\) # Works in other modes, just not against the classic/NT4 DC
292#
293# Differences in our KDC compared to windows
294#
295^samba4.krb5.kdc .*.as-req-pac-request # We should reply to a request for a PAC over UDP with KRB5KRB_ERR_RESPONSE_TOO_BIG unconditionally
296#
297# This will fail against the classic DC, because it requires kerberos
298#
299^samba4.winbind.pac.*\(nt4_member:local\) # No KDC on a classic DC
300#
301# This fails because it requires the tombstone_reanimation module to be enabled
302#
303^samba4.ldap.acl.python\(.*\).__main__.AclUndeleteTests.test_undelete\(.*\)
304#
305# This fails because our python bindings create python Lists, not a type
306# we can watch for set methods on.
307#
308^samba.tests.dcerpc.integer.samba.tests.dcerpc.integer.IntegerTests.test_.*_into_uint8_list
309#
310## We assert all "ldap server require strong auth" combinations
311#
312^samba4.ldb.simple.ldap with SIMPLE-BIND.*ad_dc_ntvfs # ldap server require strong auth = allow_sasl_over_tls
313^samba4.ldb.simple.ldap with SIMPLE-BIND.*fl2003dc # ldap server require strong auth = yes
314^samba4.ldb.simple.ldaps with SASL-BIND.*fl2003dc # ldap server require strong auth = yes
315# These are supposed to fail as we want to verify the "tls verify peer"
316# restrictions. Note that fl2008r2dc uses a self-signed certificate
317# with does not have a crl file.
318#
319^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name_if_available\(
320^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=ca_and_name\(
321^samba4.ldb.simple.ldaps.*SERVER_NAME.*tlsverifypeer=as_strict_as_possible\(
322^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=ca_and_name\(
323^samba4.ldb.simple.ldaps.*SERVER_IP.*tlsverifypeer=as_strict_as_possible\(
324^samba4.ldb.simple.ldaps.*SERVER.REALM.*tlsverifypeer=as_strict_as_possible.*fl2008r2dc
325#
326# we don't allow auth_level_connect anymore...
327#
328^samba3.blackbox.rpcclient.*ncacn_np.*with.*connect.*rpcclient # we don't allow auth_level_connect anymore
329#nt-vfs server blocks read with execute access
330^samba4.smb2.read.access
331#ntvfs server blocks copychunk with execute access on read handle
332^samba4.smb2.ioctl.copy_chunk_bad_access
Note: See TracBrowser for help on using the repository browser.