Samba code to workaround NT PDC passwd auth bug
andre.albsmeier at mchp.siemens.de
Mon Mar 13 08:55:56 GMT 2000
On Mon, 13-Mar-2000 at 09:51:16 +0100, Tobias Galitzien wrote:
> Thanks for the answer, can you tell me exactly HOW to disable it?
It might not apply cleanly since I have other patches as well
but you will get the idea...
--- smbd/password.c.ORI Fri Jul 30 07:30:34 1999
+++ smbd/password.c Fri Jul 30 07:32:25 1999
@@ -1053,9 +1053,11 @@
char *ntpass, int ntpasslen)
struct cli_state *cli;
static unsigned char badpass;
static BOOL tested_password_server = False;
static BOOL bad_password_server = False;
cli = server_client();
@@ -1064,6 +1066,7 @@
if(badpass == 0)
memset(badpass, 0x1f, sizeof(badpass));
@@ -1121,6 +1124,7 @@
* Now we know the password server will correctly set the guest bit, or is
> Andre Albsmeier wrote:
> > > I can understand why there is such code in Samba to check if an NT PDC
> > > has this bug that it considers arbitrary user/pw pairs as valid. Is this
> > > Bug in every NT Server? Can I somehow check if my particular NT Server
> > > has this bug or not and then disable Samba´s behaviour on this matter?
> > > It seems that my NT server hasn´t got this bug because otherwise it
> > > would be logged at level 3 or not?
> > >
> > > Can I be sure that the but does not appear anyway sometime?
> > I have simply disabled this stuff since it makes connecting slow
> > and I never had any failures reported by samba before.
Q: "What's the most effective Windows NT remote management tool?"
A: "A car."
More information about the samba