Changeset 919 for vendor/current/source3/param/loadparm.c
- Timestamp:
- Jun 9, 2016, 2:17:22 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/source3/param/loadparm.c
r917 r919 65 65 #include "dbwrap.h" 66 66 #include "smbldap.h" 67 #include "../lib/util/bitmap.h" 67 68 68 69 #ifdef HAVE_SYS_SYSCTL_H … … 215 216 bool bWinbindRefreshTickets; 216 217 bool bWinbindOfflineLogon; 218 bool bWinbindSealedPipes; 217 219 bool bWinbindNormalizeNames; 218 220 bool bWinbindRpcOnly; … … 336 338 bool bLanmanAuth; 337 339 bool bNTLMAuth; 340 bool bRawNTLMv2Auth; 338 341 bool bUseSpnego; 339 342 bool bClientLanManAuth; … … 353 356 bool bHostnameLookups; 354 357 bool bUnixExtensions; 358 bool bAllowDcerpcAuthLevelConnect; 355 359 bool bDisableNetbios; 356 360 char * szDedicatedKeytabFile; … … 365 369 int name_cache_timeout; 366 370 int client_signing; 371 int client_ipc_signing; 367 372 int server_signing; 368 373 int client_ldap_sasl_wrapping; … … 1383 1388 }, 1384 1389 { 1390 .label = "raw NTLMv2 auth", 1391 .type = P_BOOL, 1392 .p_class = P_GLOBAL, 1393 .ptr = &Globals.bRawNTLMv2Auth, 1394 .special = NULL, 1395 .enum_list = NULL, 1396 .flags = FLAG_ADVANCED, 1397 }, 1398 { 1385 1399 .label = "client NTLMv2 auth", 1386 1400 .type = P_BOOL, … … 2291 2305 }, 2292 2306 { 2307 .label = "allow dcerpc auth level connect", 2308 .type = P_BOOL, 2309 .p_class = P_GLOBAL, 2310 .ptr = &Globals.bAllowDcerpcAuthLevelConnect, 2311 .special = NULL, 2312 .enum_list = NULL, 2313 .flags = FLAG_ADVANCED, 2314 }, 2315 { 2293 2316 .label = "use spnego", 2294 2317 .type = P_BOOL, … … 2304 2327 .p_class = P_GLOBAL, 2305 2328 .ptr = &Globals.client_signing, 2329 .special = NULL, 2330 .enum_list = enum_smb_signing_vals, 2331 .flags = FLAG_ADVANCED, 2332 }, 2333 { 2334 .label = "client ipc signing", 2335 .type = P_ENUM, 2336 .p_class = P_GLOBAL, 2337 .ptr = &Globals.client_ipc_signing, 2306 2338 .special = NULL, 2307 2339 .enum_list = enum_smb_signing_vals, … … 4750 4782 .p_class = P_GLOBAL, 4751 4783 .ptr = &Globals.bWinbindOfflineLogon, 4784 .special = NULL, 4785 .enum_list = NULL, 4786 .flags = FLAG_ADVANCED, 4787 }, 4788 { 4789 .label = "winbind sealed pipes", 4790 .type = P_BOOL, 4791 .p_class = P_GLOBAL, 4792 .ptr = &Globals.bWinbindSealedPipes, 4752 4793 .special = NULL, 4753 4794 .enum_list = NULL, … … 5337 5378 Globals.bLanmanAuth = False; /* Do NOT use the LanMan hash, even if it is supplied */ 5338 5379 Globals.bNTLMAuth = True; /* Do use NTLMv1 if it is supplied by the client (otherwise NTLMv2) */ 5380 Globals.bRawNTLMv2Auth = false; /* Allow NTLMv2 without NTLMSSP */ 5339 5381 Globals.bClientNTLMv2Auth = True; /* Client should always use use NTLMv2, as we can't tell that the server supports it, but most modern servers do */ 5340 5382 /* Note, that we will also use NTLM2 session security (which is different), if it is available */ 5383 5384 Globals.bAllowDcerpcAuthLevelConnect = false; /* we don't allow this by default */ 5341 5385 5342 5386 Globals.map_to_guest = 0; /* By Default, "Never" */ … … 5381 5425 Globals.ldap_debug_threshold = 10; 5382 5426 5427 Globals.client_ldap_sasl_wrapping = ADS_AUTH_SASL_SIGN; 5428 5383 5429 /* This is what we tell the afs client. in reality we set the token 5384 5430 * to never expire, though, when this runs out the afs client will … … 5445 5491 Globals.bWinbindRefreshTickets = False; 5446 5492 Globals.bWinbindOfflineLogon = False; 5493 Globals.bWinbindSealedPipes = True; 5447 5494 5448 5495 Globals.iIdmapCacheTime = 86400 * 7; /* a week by default */ … … 5457 5504 5458 5505 Globals.client_signing = Auto; 5506 Globals.client_ipc_signing = Required; 5459 5507 Globals.server_signing = False; 5460 5508 … … 5710 5758 FN_GLOBAL_STRING(lp_check_password_script, &Globals.szCheckPasswordScript) 5711 5759 5760 FN_GLOBAL_BOOL(lp_allow_dcerpc_auth_level_connect, &Globals.bAllowDcerpcAuthLevelConnect) 5712 5761 FN_GLOBAL_STRING(lp_wins_hook, &Globals.szWINSHook) 5713 5762 FN_GLOBAL_CONST_STRING(lp_template_homedir, &Globals.szTemplateHomedir) … … 5723 5772 FN_GLOBAL_BOOL(lp_winbind_refresh_tickets, &Globals.bWinbindRefreshTickets) 5724 5773 FN_GLOBAL_BOOL(lp_winbind_offline_logon, &Globals.bWinbindOfflineLogon) 5774 FN_GLOBAL_BOOL(lp_winbind_sealed_pipes, &Globals.bWinbindSealedPipes) 5725 5775 FN_GLOBAL_BOOL(lp_winbind_normalize_names, &Globals.bWinbindNormalizeNames) 5726 5776 FN_GLOBAL_BOOL(lp_winbind_rpc_only, &Globals.bWinbindRpcOnly) … … 5819 5869 FN_GLOBAL_BOOL(lp_lanman_auth, &Globals.bLanmanAuth) 5820 5870 FN_GLOBAL_BOOL(lp_ntlm_auth, &Globals.bNTLMAuth) 5871 FN_GLOBAL_BOOL(lp_raw_ntlmv2_auth, &Globals.bRawNTLMv2Auth) 5821 5872 FN_GLOBAL_BOOL(lp_client_plaintext_auth, &Globals.bClientPlaintextAuth) 5822 5873 FN_GLOBAL_BOOL(lp_client_lanman_auth, &Globals.bClientLanManAuth) … … 6057 6108 FN_GLOBAL_INTEGER(lp_name_cache_timeout, &Globals.name_cache_timeout) 6058 6109 FN_GLOBAL_INTEGER(lp_client_signing, &Globals.client_signing) 6110 FN_GLOBAL_INTEGER(lp_client_ipc_signing, &Globals.client_ipc_signing) 6059 6111 FN_GLOBAL_INTEGER(lp_server_signing, &Globals.server_signing) 6060 6112 FN_GLOBAL_INTEGER(lp_client_ldap_sasl_wrapping, &Globals.client_ldap_sasl_wrapping) … … 9686 9738 } 9687 9739 9740 if (!lp_is_in_client()) { 9741 switch (lp_client_ipc_signing()) { 9742 case Required: 9743 lp_set_cmdline("client signing", "mandatory"); 9744 break; 9745 case Auto: 9746 lp_set_cmdline("client signing", "auto"); 9747 break; 9748 case False: 9749 lp_set_cmdline("client signing", "disabled"); 9750 break; 9751 } 9752 } 9753 9688 9754 init_iconv(); 9689 9755
Note:
See TracChangeset
for help on using the changeset viewer.