Samba code to workaround NT PDC passwd auth bug

Andre Albsmeier andre.albsmeier at mchp.siemens.de
Mon Mar 13 08:55:56 GMT 2000


On Mon, 13-Mar-2000 at 09:51:16 +0100, Tobias Galitzien wrote:
> Thanks for the answer, can you tell me exactly HOW to disable it?

It might not apply cleanly since I have other patches as well
but you will get the idea...

--- smbd/password.c.ORI	Fri Jul 30 07:30:34 1999
+++ smbd/password.c	Fri Jul 30 07:32:25 1999
@@ -1053,9 +1053,11 @@
 		     char *ntpass, int ntpasslen)
 {
   struct cli_state *cli;
+#if 0
   static unsigned char badpass[24];
   static BOOL tested_password_server = False;
   static BOOL bad_password_server = False;
+#endif
 
   cli = server_client();
 
@@ -1064,6 +1066,7 @@
     return(False);
   }  
 
+#if 0
   if(badpass[0] == 0)
     memset(badpass, 0x1f, sizeof(badpass));
 
@@ -1121,6 +1124,7 @@
       return False;
     }
   }
+#endif
 
   /*
    * Now we know the password server will correctly set the guest bit, or is

> 
> 
> Andre Albsmeier wrote:
> 
> > > I can understand why there is such code in Samba to check if an NT PDC
> > > has this bug that it considers arbitrary user/pw pairs as valid. Is this
> > > Bug in every NT Server? Can I somehow check if my particular NT Server
> > > has this bug or not and then disable Samba´s behaviour on this matter?
> > > It seems that my NT server hasn´t got this bug because otherwise it
> > > would be logged at level 3 or not?
> > >
> > > Can I be sure that the but does not appear anyway sometime?
> > 
> > I have simply disabled this stuff since it makes connecting slow
> > and I never had any failures reported by samba before.

-- 
Q: "What's the most effective Windows NT remote management tool?"
A: "A car."


More information about the samba mailing list