Changeset 860 for vendor/current/source3/auth
- Timestamp:
- May 12, 2014, 8:58:38 PM (11 years ago)
- Location:
- vendor/current/source3/auth
- Files:
-
- 6 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/source3/auth/auth_util.c
r746 r860 121 121 122 122 if (!is_trusted_domain(domain) && 123 !strequal(domain, my_sam_name())) 123 !strequal(domain, my_sam_name()) && 124 !strequal(domain, get_global_sam_name())) 124 125 { 125 126 if (lp_map_untrusted_to_domain()) … … 902 903 NTSTATUS make_serverinfo_from_username(TALLOC_CTX *mem_ctx, 903 904 const char *username, 905 bool use_guest_token, 904 906 bool is_guest, 905 907 struct auth_serversupplied_info **presult) … … 925 927 result->guest = is_guest; 926 928 927 status = create_local_token(result); 929 if (use_guest_token) { 930 status = make_server_info_guest(mem_ctx, &result); 931 } else { 932 status = create_local_token(result); 933 } 928 934 929 935 if (!NT_STATUS_IS_OK(status)) { … … 1175 1181 /* work around 'winbind use default domain = yes' */ 1176 1182 1177 if ( !strchr_m( pw->pw_name, *lp_winbind_separator() ) ) { 1183 if ( lp_winbind_use_default_domain() && 1184 !strchr_m( pw->pw_name, *lp_winbind_separator() ) ) { 1178 1185 char *domain; 1179 1186 -
vendor/current/source3/auth/auth_winbind.c
r740 r860 63 63 64 64 /* Send off request */ 65 66 65 params.account_name = user_info->client.account_name; 67 params.domain_name = user_info->mapped.domain_name; 66 /* 67 * We need to send the domain name from the client to the DC. With 68 * NTLMv2 the domain name is part of the hashed second challenge, 69 * if we change the domain name, the DC will fail to verify the 70 * challenge cause we changed the domain name, this is like a 71 * man in the middle attack. 72 */ 73 params.domain_name = user_info->client.domain_name; 68 74 params.workstation_name = user_info->workstation_name; 69 75 -
vendor/current/source3/auth/check_samsec.c
r740 r860 409 409 if (pdb_get_acct_ctrl(sampass) & ACB_AUTOLOCK) { 410 410 DEBUG(3,("check_sam_security: Account for user %s was locked out.\n", username)); 411 TALLOC_FREE(sampass); 411 412 return NT_STATUS_ACCOUNT_LOCKED_OUT; 412 413 } -
vendor/current/source3/auth/proto.h
r740 r860 150 150 NTSTATUS make_serverinfo_from_username(TALLOC_CTX *mem_ctx, 151 151 const char *username, 152 bool use_guest_token, 152 153 bool is_guest, 153 154 struct auth_serversupplied_info **presult); -
vendor/current/source3/auth/server_info.c
r746 r860 609 609 if (!info3) return NULL; 610 610 611 info3->base.last_logon = info->logon_time;612 info3->base.last_logoff = info->logoff_time;613 info3->base.acct_expiry = info->kickoff_time;611 unix_to_nt_time(&info3->base.last_logon, info->logon_time); 612 unix_to_nt_time(&info3->base.last_logoff, info->logoff_time); 613 unix_to_nt_time(&info3->base.acct_expiry, info->kickoff_time); 614 614 unix_to_nt_time(&info3->base.last_password_change, info->pass_last_set_time); 615 615 unix_to_nt_time(&info3->base.allow_password_change, -
vendor/current/source3/auth/user_util.c
r740 r860 426 426 427 427 /* 428 * Setup the last_from and last_to as an optimization so 428 * If we didn't successfully map a user in the loop above, 429 * setup the last_from and last_to as an optimization so 429 430 * that we don't scan the file again for the same user. 430 431 */ 431 432 set_last_from_to(user_in, user_in); 433 store_map_in_gencache(ctx, user_in, user_in); 432 if (!mapped_user) { 433 DEBUG(8, ("The user '%s' has no mapping. " 434 "Skip it next time.\n", user_in)); 435 set_last_from_to(user_in, user_in); 436 store_map_in_gencache(ctx, user_in, user_in); 437 } 434 438 435 439 return mapped_user;
Note:
See TracChangeset
for help on using the changeset viewer.