The annotated tag, ldb-2.5.0 has been created at 3e87034f37af8e68b85968b71fc65e60b891697e (tag) tagging 1d5b155619bc532c46932965b215bd73a920e56f (commit) replaces tdb-1.4.5 tagged by Stefan Metzmacher on Mon Jan 24 13:25:10 2022 +0100
- Log ----------------------------------------------------------------- ldb: tag release ldb-2.5.0 -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEkUejOXGVGO6QEby1R5ORYRMIQCUFAmHumqYACgkQR5ORYRMI QCXB/gf/WgksmkBsIhXzSraUKKeraOEGLz/YAbG/zpLhVA7diV9B8HCr66f6R5i0 Tq5bUisLi7FrxdgLyqrHBUn00urjzApFmX/gfmyVAIeOuh8JPI5ArsP8DXztQXPD ukP4G3RmUbs7TLl542xHjWcsm34gOzuzLSowfjtnRwCRaAgJjauAtRkY3z0eSR/r YFnDXAG91IBxlVIVCdHTahhdigEroDnhhPA9ezea6YQSA8ILnXhZpbKus+sr5/dM cti5Ytmfp5AkgXJZqChIbkt8L14LefKAnqnFS7Xn7ewfx+YnuoLWMg4B8cbyq4sG DT+TFH/tYWIaHoHEeFhPbjiLs6hWxQ== =LxmQ -----END PGP SIGNATURE----- Alenka Glukhovskaya (1): Added russian translate file Alex Richardson (8): Don't use sysconf(_SC_NGROUPS_MAX) on macOS for getgroups() charset_macosxfs.c: fix compilation on macOS audit_logging.c: fix compilation on macOS source3/printing/queue_process.c: fix build on macOS sec_ctx.c: Fix -Wunused-function warning on macOS source3/smbd/statcache.c: Fix -Wformat build error on macOS vfs_preopen.c: Fix -Wformat error on macOS Fix detection of rpc/xdr.h on macOS Alexander Bokovoy (2): CVE-2020-25717: Add FreeIPA domain controller role IPA DC: add missing checks Amitay Isaacs (1): lib/tsocket: Fix build on Freebsd Andreas Schneider (64): bootstrap: Install krb5-workstation on Fedora based distros autobuild: Exclude fips envs from samba and samba-mitkrb5 s3:tests: Add smbclient kerberos tests for ad_dc and ad_dc_fips python:waf: Correctly check for python-dateutil bootstrap: Install python3-dateutil instead of python3-iso8601 on RPM distros lib:cmdline: Use lp_load_global() for servers selftest: Re-format long lines in selftesthelpers.py selftest: Add support for setting ENV variables in plansmbtorture4testsuite() selftest: Add support for setting ENV variables in plantestsuite() s3:selftests: Pass env variables to fips tests s4:selftests: Pass env variables to fips tests selftest: Pass env variables to fips tests selftest: Remove fips env variables from client env auth:gensec: Use lpcfg_weak_crypto() s4:rpc_server: Allow to set user password in FIPS mode s4:libnet: Remove trailing whitespaces s4:libnet: Allow libnet_SetPassword() for encrypted SMB connections netlogon:schannel: If weak crypto is disabled, do not announce RC4 support. selftest: Fix setting environ for plansmbtorture4testsuite() s4:selftest: Pass environ to plansmbtorture4testsuite() s4:torture: Remove trailing whitespaces in rpc.c s4:torture: Add rpc netlogon fips test configure: Do not put arguments into double quotes s3:winbindd: Add a check for the path length of 'winbindd socket directory' gitlab: Use shorter names for Samba AD DC env with MIT KRB5 mit-samba: Define debug class for kdb module mit-samba: Send the logging to the kdc log facility mit-samba: Use talloc_get_type_abort() instead of casting mit-samba: Only set the function opening bracket once s3:winbind: Do not start if the priviliged socket path is too long s3:winbindd: Pass the right variable to the debug message lib:replace: Remove trailing spaces from testsuite.c testsuite: Fix build with gcc >= 11.1.1 selftest: Add python path for compiled python modules like ldb third_party: Add a script to update waf third_party: Update waf to version 2.0.22 s3:utils: Fix format error lib:fuzzing: Fix quoting of --fuzz-target-ldflags docs-xml: Remove trailing spaces in smb.conf.5.xml docs-xml: Use /var/tmp for spooling in smb.conf.5 waf: Allow building with MIT KRB5 >= 1.20 Revert "gp: Apply Firewalld Policy" Revert "gp: Test Firewalld Group Policy Apply" Revert "gp: Add Firewalld ADMX templates" testprogs: Use new cmdline option for kerberos lib:cmdline: Fix -k option which doesn't expect anything third_party: Update pam_wrapper to version 1.1.4 editorconfig: Heimdal has mixed spaces and tabs with different width waf: Fix resolv_wrapper with glibc 2.34 gitlab-ci: Add Fedora 35 and drop Fedora 33 CVE-2020-25719 mit-samba: Make ks_get_principal() internally public CVE-2020-25719 mit-samba: Add ks_free_principal() CVE-2020-25719 mit-samba: If we use client_princ, always lookup the db entry CVE-2020-25719 mit-samba: Add mit_samba_princ_needs_pac() CVE-2020-25719 mit-samba: Handle no DB entry in mit_samba_get_pac() CVE-2020-25719 mit-samba: Rework PAC handling in kdb_samba_db_sign_auth_data() CVE-2020-25719 mit_samba: The samba_princ_needs_pac check should be on the server entry CVE-2020-25719 mit_samba: Create the talloc context earlier CVE-2020-25719 s4:kdc: Remove trailing spaces in pac-glue.c CVE-2020-25719 s4:kdc: Add samba_kdc_validate_pac_blob() CVE-2020-25719 s4:kdc: Check if the pac is valid before updating it auth:creds: Remove trailing spaces auth:creds: Guess the username first via getpwuid(my_id) docs-xml: Fix smbget manpage Andrew Bartlett (104): ktutil: Print the numeric enctype if krb5_enctype_to_string() fails samba-tool domain backup offline: Use passed in samdb when backing up sam.ldb samba-tool: Rework transations/locks to hold a lock during mdb backup samba-tool domain backup: Use tdbbackup on metadata.tdb autobuild.py: Explain why each job is removed from the default set gitlab-ci/autobuild: Add new build confirming behaviour on older MIT Kerberos gitlab-ci: Move MIT builds to current Fedora so we can test against a current MIT KDC autobuild.py: Do not build MIT builds by default (eg sn-devel) build: Move minimum MIT krb5 version to 1.19 to align with what is tested mit-kdc: Remove build time support for KDB_API < 10 selftest: Remove skip of samba4.rpc.unixinfo selftest: Modernise user_account_control.py tests use a common self.OU selftest: Use addCleanup rather than tearDown in user_account_control.py pydsdb: Add API to return strings of known UF_ flags selftest: Use @DynamicTestCase in user_account_control test_uac_bits_unrelated_modify() selftest: Replace internal loop in test_uac_bits_add() using @DynamicTestClass selftest: Replace internal loop in test_uac_bits_set() using @DynamicTestClass script/autobuild.py: Restore MIT ADDC tests against fl2008* bootstrap: Update to get newer krb5 on Fedora 34 bootstrap: SAMBA_CI_CONTAINER_TAG is now in .gitlab-ci-main.yml Update common on currently supported Fedora versions tests/krb5: Remove harmful and a-typical return in as_req testcase tests/krb5: Allow KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN for a missing sname selftest: Split up targets for samba_tool_drs from samba_tool_drs_showrepl selftest: Only run samba_tool_drs_showrepl test once dsdb: Be careful to avoid use of the expensive talloc_is_parent() selftest: Add a test for LookupSids3 and LookupNames4 in python s4-lsa: Cache sam.ldb handle in lsa_LookupSids3/LookupNames4 selftest: Add prefix to new schema attributes to avoid flapping dsdb_schema_attributes docs: Ensure to rebuild manpages if samba.entities or samba.version changes docs: Document all the other ways to send a password to smbclient et al docs: Avoid duplicate information on USER and PASSWD, reference the common section build: Make Python 3.6 the minimum to build now oss-fuzz is upgraded heimdal: Remove lex.yy.c file left over from a bug in lexyacc.sh bootstrap: Remove last references to Ubuntu 16.04 selftest: Update user_account_control tests to pass against Windows 2019 autobuild: allow AUTOBUILD_FAIL_IMMEDIATELY=0 (say from a gitlab variable) .gitlab-ci: Ignore errors from missing source files in code coverage .gitlab-ci: Allow a 1 hour to build Samba samldb: Address birthday paradox adding an RODC selftest: Move self.assertRaisesLdbError() to samba.tests.TestCase selftest: Use self.assertRaisesLdbError() in user_account_control.py test Release ldb 2.4.1 Release ldb 2.50 for the future samba 4.16 series .gitlab-ci.yml: Honour AUTOBUILD_SKIP_SAMBA_O3 in GitLab CI .gitlab-ci.yml: Restore building most of our jobs .gitlab-ci: Avoid duplicate CI on all merge requests gitlab-ci: Do not retry for job_execution_timeout gitlab-ci: Do not download artifacts of unrelated builds selftest/dbcheck: Fix up RODC one-way links (use correct dbcheck rule) kdc: Remove UF_NO_AUTH_DATA_REQUIRED from client principals kdc: Correctly strip PAC, rather than error on UF_NO_AUTH_DATA_REQUIRED for servers selftest: Remove duplicate setup of $base_dn and $ldbmodify selftest: Improve error handling and perl style when setting up users in Samba4.pm dsdb: Allow special chars like "@" in samAccountName when generating the salt lib/krb5_wrap: Fix missing error check in new salt code CVE-2020-25722 dsdb: Tests for our known set of privileged attributes CVE-2020-25722 dsdb: Move krbtgt password setup after the point of checking if any passwords are changed CVE-2020-25722 dsdb: Restrict the setting of privileged attributes during LDAP add/modify CVE-2020-25722 selftest: Extend priv_attrs test - work around UF_NORMAL_ACCOUNT rules on Windows 2019 (requires |UF_PASSWD_NOTREQD or a password) - extend to also cover the sensitive UF_TRUSTED_FOR_DELEGATION CVE-2020-25722 selftest: Test combinations of account type and objectclass for creating a user CVE-2020-25722 selftest: allow for future failures in BindTests.test_virtual_email_account_style_bind CVE-2020-25722 selftest: Catch possible errors in PasswordSettingsTestCase.test_pso_none_applied() CVE-2020-25722 selftest: Catch errors from samdb.modify() in user_account_control tests CVE-2020-25722 dsdb: objectclass computer becomes UF_WORKSTATION_TRUST by default CVE-2020-25722 dsdb: Improve privileged and unprivileged tests for objectclass/doller/UAC CVE-2020-25722 dsdb: Prohibit mismatch between UF_ account types and objectclass. CVE-2020-25722 selftest/priv_attrs: Mention that these knownfails are OK (for now) CVE-2020-25722 selftest: Adapt selftest to restriction on swapping account types CVE-2020-25722 dsdb: samldb_objectclass_trigger() is only called on ADD, so remove indentation CVE-2020-25722 dsdb: Add restrictions on computer accounts without a trailing $ CVE-2020-25722 selftest: Adapt sam.py test_isCriticalSystemObject to new UF_WORKSTATION_TRUST_ACCOUNT default CVE-2020-25722 samdb: Fill in isCriticalSystemObject on any account type change CVE-2020-25722 selftest: Split test_userAccountControl into unit tests CVE-2020-25722 selftest: Adjust sam.py test_userAccountControl_computer_add_trust to new reality CVE-2020-25722 selftest: New objects of objectclass=computer are workstations by default now CVE-2020-25722 selftest: Adapt sam.py test to userAccountControl/objectclass restrictions CVE-2020-25722 selftest: adapt ldap.py/sam.py test_all tests to new default computer behaviour CVE-2020-25722 selftest: Allow self.assertRaisesLdbError() to take a list of errors to match with CVE-2020-25722 selftest/user_account_control: Allow a broader set of possible errors CVE-2020-25722 selftest/user_account_control: more work to cope with UAC/objectclass defaults and lock CVE-2020-25721 krb5pac: Add new buffers for samAccountName and objectSID CVE-2020-25722 Check all elements in acl_check_spn() not just the first one CVE-2020-25722 Check for all errors from acl_check_extended_right() in acl_check_spn() CVE-2020-25718 kdc: Remove unused samba_kdc_get_pac_blob() CVE-2020-25718 s4-rpc_server: Change sid list functions to operate on a array of struct dom_sid CVE-2020-25718 s4-rpc_server: Obtain the user tokenGroups earlier CVE-2020-25718 s4-rpc_server: Put RODC reveal/never reveal logic into a single helper function CVE-2020-25718 s4-rpc_server: Put msDS-KrbTgtLinkBL and UF_INTERDOMAIN_TRUST_ACCOUNT RODC checks in common CVE-2020-25718 s4-rpc_server: Confirm that the RODC has the UF_PARTIAL_SECRETS_ACCOUNT bit CVE-2020-25718 s4-rpc_server: Provide wrapper samdb_confirm_rodc_allowed_to_repl_to() CVE-2020-25718 s4-rpc_server: Remove unused attributes in RODC check CVE-2020-25718 s4-rpc_server: Explain why we use DSDB_SEARCH_SHOW_EXTENDED_DN in RODC access check CVE-2020-25718 s4-rpc_server: Add in debug messages into RODC processing CVE-2020-25718 dsdb: Bring sid_helper.c into common code as rodc_helper.c CVE-2020-25718 kdc: Confirm the RODC was allowed to issue a particular ticket CVE-2020-25719 kdc: Avoid races and multiple DB lookups in s4u2self check CVE-2020-25721 auth: Fill in the new HAS_SAM_NAME_AND_SID values CVE-2020-25722 Ensure the structural objectclass cannot be changed CVE-2020-25722 kdc: Do not honour a request for a 3-part SPN (ending in our domain/realm) unless a DC Revert "CVE-2020-25719 heimdal:kdc: Require authdata to be present" CVE-2020-25719 selftest: Always expect a PAC in TGS replies with Heimdal CVE-2020-25717: s3:auth: Fallback to a SID/UID based mapping if the named based lookup fails CVE-2021-3670 ldb: Confirm the request has not yet timed out in ldb filter processing Andrew Walker (1): s3:modules:recycle - fix crash in recycle_unlink_internal Bjoern Jacke (1): util_sock: fix assignment of sa_socklen Björn Jacke (3): ntvfs: add missing COM/LPT ports that are also reserved names mangle_hash2: add missing COM/LPT ports that are also reserved names mangle_hash2: remove LOCK$ from list of reserved names Christof Schmitt (30): smbd: Update comment explaining streams and file-system sharemodes vfs_gpfs: Update comment in vfs_gpfs_kernel_flock vfs_gpfs: Remove call to kernel_flock vfs_default: Return ENOTSUP for sharemodes flock call system: Remove kernel_flock wscript: Remove config check for LOCK_MAND loadparm: Set default of "kernel share modes" to "no" docs-xml: Update manpage for "kernel share modes" option WHATSNEW: Document changes for "kernel share modes" profile: Remove syscall_kernel_flock profiling VFS: Rename kernel_flock to filesystem_sharemode VFS: Increase VFS version for renamed function examples/VFS/skel_transparent: Rename kernel_flock to filesystem_sharemode examples/VFS/skel_opaque: Rename kernel_flock to filesystem_sharemode s3: Remove definition of removed kernel_flock function vfs_full_audit: Rename kernel_flock to filesystem_sharemode docs-xml: Update vfs_full_audit manpage for renamed function vfs_ceph: Rename kernel_flock to filesystem_sharemode vfs_glusterfs: Rename kernel_flock to filesystem_sharemode vfs_time_audit: Rename kernel_flock to filesystem_sharemode vfs_time_audit: Fix message for fcntl VFS call vfs_gpfs: Rename kernel_flock to filesystem_sharemode vfs_streams_xattr: Rename kernel_flock to filesystem_sharemode vfs_default: Rename kernel_flock to filesystem_sharemode vfs_catia: Rename kernel_flock to filesystem_sharemode VFS: Update tracking documents for renamed function smbd: Update comment for durable handles smbd: Rename return variable for requesting filesystem sharemode smbd: Remove return variable for releasing filesystem sharemode smbd: Update debug messages for failed sharemode release David Disseldorp (1): smbd: check lp_load_printers before reload via NetShareEnum David Gajewski (1): s3: VFS: solarisacl: Fix compile error (missed variable rename). David Mulder (23): gpo: Ensure Network Device Enrollment Service if sscep fails gpo: Warn when fetching the supported templates fails gpo: Improve debug when extension fails to apply gpo: Enable user policy application gpo: Enable Scripts ADMX for User Policy gpo: Test Group Policy User Scripts gpo: Apply Group Policy User Scripts gpo: Ignore symlink failure on sscep renew gpo: Decode the bytes for cepces-submit failure gpo: Print getcert message to debug gpo: Test Group Policy Firefox Extension gpo: Add Group Policy Firefox Extension gpo: Test Chromium Group Policy gpo: Add Chromium Group Policy gp: Add Firewalld ADMX templates gp: Test Firewalld Group Policy Apply gp: Apply Firewalld Policy samba-tool: Pick local host if calling samba-tool from DC Revert "samba-tool: Pick local host if calling samba-tool from DC" gp: Add Firewalld ADMX templates gp: Test Firewalld Group Policy Apply gp: Apply Firewalld Policy samba-tool: Add domain member leave Douglas Bagnall (53): pytest/rodc_rwdc: try to avoid race. pytest: dynamic tests optionally add __doc__ pytest: s3_net_join: avoid name clash CVE-2020-25722 pytests: add reverse lookup dict for LDB error codes CVE-2020-25722 pytest: assertRaisesLdbError invents a message if you're lazy CVE-2020-25722 s4/dsdb/cracknames: always free tmp_ctx in spn_alias CVE-2020-25722 s4/cracknames: lookup_spn_alias doesn't need krb5 context CVE-2020-25722 samba-tool spn: accept -H for database url CVE-2020-25722 samba-tool spn add: remove --force option CVE-2020-25722 tests: blackbox samba-tool spn non-admin test CVE-2020-25722 s4/provision: add host/ SPNs at the start CVE-2020-25722 blackbox/upgrades tests: ignore SPN for ldapcmp CVE-2020-25722 pytest: test sAMAccountName/userPrincipalName over ldap CVE-2020-25722 pytest: test setting servicePrincipalName over ldap CVE-2020-25722 s4/cracknames: add comment pointing to samldb spn handling CVE-2020-25722 s4/dsdb/samldb: add samldb_get_single_valued_attr() helper CVE-2020-25722 s4/dsdb/samldb: unique_attr_check uses samldb_get_single_valued_attr() CVE-2020-25722 s4/dsdb/samldb: check for clashes in UPNs/samaccountnames CVE-2020-25722 s4/dsdb/samldb: check sAMAccountName for illegal characters CVE-2020-25722 s4/dsdb/samldb: check for SPN uniqueness, including aliases CVE-2020-25722 s4/dsdb/samldb: reject SPN with too few/many components CVE-2020-25722 s4/dsdb modules: add dsdb_get_expected_new_values() CVE-2020-25722 s4/dsdb/samldb: samldb_get_single_valued_attr() check all values CVE-2020-25722 s4/dsdb/samldb: samldb_sam_accountname_valid_check() check all values CVE-2020-25722 s4/dsdb/samldb: samldb_schema_add_handle_linkid() checks all values CVE-2020-25722 s4/dsdb/samldb: samldb_schema_add_handle_mapiid() checks all values CVE-2020-25722 s4/dsdb/samldb: samldb_prim_group_change() checks all values CVE-2020-25722 s4/dsdb/samldb: samldb_user_account_control_change() checks all values CVE-2020-25722 s4/dsdb/samldb _user_account_control_change() always add final value CVE-2020-25722 s4/dsdb/samldb: samldb_pwd_last_set_change() checks all values CVE-2020-25722 s4/dsdb/samldb: samldb_lockout_time() checks all values CVE-2020-25722 s4/dsdb/samldb: samldb_group_type_change() checks all values CVE-2020-25722 s4/dsdb/samldb: samldb_service_principal_names_change checks values CVE-2020-25722 s4/dsdb/samldb: samldb_fsmo_role_owner_check checks values CVE-2020-25722 s4/dsdb/samldb: samldb_fsmo_role_owner_check() wants one value CVE-2020-25722 s4/dsdb/pwd_hash: password_hash_bypass gets all values CVE-2020-25722 s4/dsdb/pwd_hash: rework pwdLastSet bypass CVE-2020-25722 s4/dsdb/util: remove unused dsdb_get_single_valued_attr() pytests: check that we don't have bad format characters test/bad_chars: ensure our tests could fail s3/modules/vfs_acl_common.h: use utf-8 test/blackbox/test_samba-tool_ntacl: use utf-8 s4/auth/gensec/gensec_krb5_heimdal: use utf-8 lib/replace/timegm: use utf-8 third_party: remove pep8 pytest/source_chars: forget thirdparty/pep8 test file third_party/update: forget pep8 py/dnsserver: add missing imports py/dnsserver: add a missing exception variable pytest/dns_aging: use correct variable names pytest/dns_aging: remove duplicate tests pytest/docs: set_smbconf_arbitrary_opposite() needs param_type pytest/docs: better spelling of set_smbconf_arbitrary Gary Lockyer (1): initial FAST tests Günther Deschner (3): s3-torture: give torture test binaries their own wscript_build s3-torture: Only install vfstest manpage when vfstest binary gets installed. s3-winexe: Fix winexe core dump (use-after-free) Isaac Boukris (4): kdc: remove KRB5SignedPath, to be replaced with PAC kdc: sign ticket using Windows PAC krb5: allow NULL parameter to krb5_pac_free() krb5: rework PAC validation loop Jeremy Allison (67): s3: smbd: Allow async dosmode to cope with ".." pathnames where we close smb_fname->fsp to prevent meta-data leakage. s3: smbd: Don't leak meta-data about the containing directory of the share root. s3: VFS: ceph. Fix enumerating directories. dirfsp->fh->fd != AT_FDCWD in this case. s3: smbd: Split out smb2_ioctl_smbtorture() into a separate file. s3: libcli: Add FSCTL_SMBTORTURE_FSP_ASYNC_SLEEP. s3: smbd: Add smbd_fsctl_torture_async_sleep() server-side code. s3: smbd: Call smbd_fsctl_torture_async_sleep() when we get FSCTL_SMBTORTURE_FSP_ASYNC_SLEEP. s4: torture: Add test for smb2.ioctl.bug14769. s3: smbd: For FSCTL calls that go async, add the outstanding tevent_reqs to the aio list on the file handle. s3: selftest: Add a test for vfs_streams_depot with the target path outside of the share. s3: VFS: vfs_streams_depot: Factor out the code that gets the absolute stream rootdir into a function. s3: VFS: streams_depot: Allow "streams directory" outside of share path to work again. s3: smbd: Ensure all returns from OpenDir() correctly set errno. s3: mdssvc: Correctly disconnect the VFS connection inside the mds_ctx destructor. s3: smbd: In create_conn_struct_cwd(), don't TALLOC_FREE() an unallocated pointer on error. s4: ntvfs: Missed comma in 24c09f913d82528ada14013e3d673d277cf04a93, string would be concatenated. s3: smbd: Add fifo test for the DISABLE_OPATH case. s3: smbd: Fix openat_pathref_fsp() to cope with FIFO's in the filesystem. s3: auth: Andrew noticed f585f01148ab2d8f84c96b12e018742f5f17bcb0 doesn't keep the same logic. s4: process_prefork: Make prefork_restart() use an asynchronous timer event instead of calling sleep(X). s3: selftest: Add regression test to show the $cwd cache is misbehaving when we connect as a different user on a share. s3: smbd: Ensure when we change security context we delete any $cwd cache. s3: VFS: zfsacl: Ensure we use a pathref fd, not an io fd, for getting/setting ZFS ACLs. s3: smbspool. Remove last use of 'extern char **environ;'. s3: smbd: Add two tests showing recursive directory delete of a directory containing veto file and msdfs links over SMB2. s3: smbd: Fix recursive directory delete of a directory containing veto file and msdfs links. s3: smbd: Add two tests showing the ability to delete a directory containing a dangling symlink over SMB2 depends on "delete veto files" setting. s3: VFS: streams_depot. Allow unlinkat to cope with dangling symlinks. s3: VFS: xattr_tdb. Allow unlinkat to cope with dangling symlinks. s3: smbd: Fix rmdir_internals() to do an early return if lp_delete_veto_files() is not set. s3: smbd: Fix logic in rmdir_internals() to cope with dangling symlinks. s3: smbd: Fix logic in can_delete_directory_fsp() to cope with dangling symlinks. s3: docs-xml: Clarify the "delete veto files" paramter. s3: smbd: dirfsp is being used uninitialized inside rmdir_internals(). s3: smbtorture3: Add test for setting delete on close on a directory, then creating a file within to see if delete succeeds. s3: smbd: Ensure in the directory scanning loops inside rmdir_internals() we don't overwrite the 'ret' variable. s3: smbd: get_real_filename() is actually static to filename.c s3: smbd: Add ucf_flags parameter to normalize_filename_case(). s3: smbd: Ensure normalize_filename_case() doesn't modify posix names. s3: smbd: Add case_sensitive, case_preserve, short_case_preserve to state struct. s3: smbd: Use state->case_sensitive instead of state->conn->case_sensitive. s3: smbd: Use state->case_preserve instead of state->conn->case_preserve. s3: smbd: Use state->short_case_preserve instead of state->conn->short_case_preserve. s3: smbd: Turn on case sensitivity for a posix filename lookup. s3: smbd: Add comment to unix_convert() explaining why posix never calls into mangle_is_mangled() here. s3: smbd: In unix_convert_step_search_fail() ensure posix names don't call into name mangling functions. s3: smbd: In unix_convert() component_was_mangled is always false for posix. s3: smbd: Add 'bool case_sensitive' to struct smbd_dirptr_lanman2_state. s3: smbd: Use state->case_sensitive instead of state->conn->case_sensitive. s3: smbd: Add case_sensitive to struct smb_Dir. s3: smbd: Use dir_hnd->case_sensitive instead of conn->case_sensitive. s3: smbd: In OpenDir_fsp(), set dir_hnd->case_sensitive to true if FSP_POSIX_FLAGS_OPEN is set. s3: smbd: Add dptr_case_sensitive(). Not yet used. s3: smbd: Use dptr_case_sensitive() in directory listing code. s3: smbd: In open_file(), use a helper variable instead of always checking sp->posix_flags & FSP_POSIX_FLAGS_OPEN. s3: smbd: In open_file() use the helper variable to select correct case_sensitive setting to is_in_path(). s3: smbd: Use a helper variable in smbd_smb2_query_directory_send(). s3: smbd: Add and use case_sensitive helper variable to unlink_internals(). s3: smbd: Add and use helper variables case_sensitive, case_preserve in rename_internals_fsp(). s3: smbd: Add and use helper variable posix_pathname in rename_internals(). s3: smbd: Ensure we never call mangle_is_mangled() for a posix path. s3: smbd: Add and use helper variables for case_sensitive, case_preserve, short_case_preserve to rename_internals(). s3: smbd: In SMB1 reply_copy(), make req->posix_pathnames a helper variable. s3: smbd: SMB1 reply_copy(). Posix pathnames should never call into mangle_is_mangled(). s3: smbd: SMB1 reply_copy(). Posix pathnames always means case_sensitive = true. s3: smbd: In unlink_internals() ensure we never call mangle_is_mangled for a posix path. s3: smbd: In SMB1 call_trans2findnext() add and use a helper variable to ensure we don't call mangle_is_mangled() with a posix name. Joseph Sutton (309): pygensec: Fix memory leaks pygensec: Don't modify Python bytes objects tests/krb5: Fix ms_kile_client_principal_lookup_test errors tests/krb5: Fix comment typo tests/krb5: Fix method name typo tests/krb5: formatting tests/krb5: Remove unneeded statements tests/krb5: Use more compact dict lookup tests/krb5: Simplify Python syntax tests/krb5: Remove magic constants tests/krb5: Fix including enc-authorization-data tests/krb5: Fix callback_dict parameter tests/krb5: Fix encpart_decryption_key with MIT KDC tests/krb5: Expect e-data except when the error code is KDC_ERR_GENERIC tests/krb5: Check Kerberos protocol version number tests/krb5: Use credentials kvno when creating password key tests/krb5: Allow cf2 to automatically use the enctype of the first key tests/krb5: Refactor get_pa_data() tests/krb5: Add get_enc_timestamp_pa_data_from_key() tests/krb5: Add method to return dict containing padata elements tests/krb5: Make _test_as_exchange() return value more consistent tests/krb5: Add get_EpochFromKerberosTime() tests/krb5: Use encryption with admin credentials tests/krb5: Allow specifying additional details when creating an account tests/krb5: Add more methods for obtaining machine and service credentials tests/krb5: Add method to calculate account salt tests/krb5: Add check_reply() method to check for AS or TGS reply tests/krb5: Always specify expected error code tests/krb5: Include kdc_options in kdc_exchange_dict tests/krb5: Only allow specifying one of check_rep_fn and check_error_fn tests/krb5: Ensure in assertElementPresent() that container elements are not empty tests/krb5: Assert that more variables are not None tests/krb5: Check version number of obtained ticket tests/krb5: Make checking less strict tests/krb5: Check nonce in EncKDCRepPart tests/krb5: Add generate_ap_req() method tests/krb5: Ensure generated padata is not None tests/krb5: Generate AP-REQ for TGS request in _generic_kdc_exchange() tests/krb5: Add more ASN1 definitions for FAST tests/krb5: Add more methods to create ASN1 objects for FAST tests/krb5: Add method to generate FAST encrypted challenge padata tests/krb5: Add methods to calculate keys for FAST tests/krb5: Rename generic_check_as_error() to generic_check_kdc_error() tests/krb5: Include authenticator_subkey in AS-REQ exchange dict tests/krb5: Modify generate_ap_req() to also generate FAST armor AP-REQ tests/krb5: Add FAST armor generation to _generic_kdc_exchange() tests/krb5: Allow specifying parameters specific to the outer request body tests/krb5: Add method to check PA-FX-FAST-REPLY tests/krb5: Add method to verify ticket checksum for FAST tests/krb5: Check FAST response tests/krb5: Add functions to get dicts of request padata tests/krb5: Add methods to determine whether elements were included in the request tests/krb5: Check encrypted-pa-data tests/krb5: Add expected_cname_private parameter to kdc_exchange_dict tests/krb5: Include authdata in kdc_exchange_dict tests/krb5: Add generate_simple_fast() method to generate FX-FAST padata tests/krb5: Add check_rep_padata() method to check padata in reply tests/krb5: Don't expect RC4 in ETYPE-INFO2 for a non-error reply tests/krb5: Remove unused variables tests/krb5: Add get_krbtgt_sname() method tests/krb5: Check sname is krbtgt for FAST generic error tests/krb5: Check reply FAST padata if request included FAST tests/krb5: Adjust reply padata checking depending on whether FAST was sent tests/krb5: Check PADATA-ENCRYPTED-CHALLENGE in reply tests/krb5: Check PADATA-FX-COOKIE in reply tests/krb5: Make check_rep_padata() also work for checking TGS replies tests/krb5: Make generic_check_kdc_error() also work for checking TGS replies tests/krb5: Check PADATA-PAC-OPTIONS in reply tests/krb5: Allow generic_check_kdc_error() to check inner FAST errors tests/krb5: Check PADATA-FX-ERROR in reply tests/krb5: Add FAST tests tests/krb5: Make e-data checking less strict tests/krb5: Make cname checking less strict tests/krb5: Add test for sending PA-ENCRYPTED-CHALLENGE without FAST CVE-2021-3671 tests/krb5: Add tests for omitting sname in outer request tests/krb5: Check e-data element for TGS-REP errors without FAST tests/krb5: Check PADATA-PW-SALT element in e-data tests/krb5: Add tests for omitting sname in request tests/krb5: Allow specifying parameters specific to the inner FAST request body tests/krb5: Add tests for omitting sname in inner request tests/krb5: Allow expected_error_mode to be a container type dsdb/samdb/ldb_modules: Use correct member of union s4/dnsserver: Don't call memcpy() with a NULL pointer s4/dnsserver: Fix NULL check libcli/smb: Don't call memcpy() with a NULL pointer python: Fix usage strings Fix Python docstrings krb5pac.idl: Add ticket checksum PAC buffer type security.idl: Add well-known SIDs for FAST tests/krb5: Calculate expected salt if not given explicitly tests/krb5: Add methods to obtain the length of checksum types tests/krb5: Use signed integers to represent key version numbers in ASN.1 tests/krb5: Add KDCOptions flag for constrained delegation tests/krb5: Use more compact dict lookup tests/krb5: Replace expected_cname_private with expected_anon parameter tests/krb5: Allow specifying an OU to create accounts in tests/krb5: Allow specifying additional User Account Control flags for account tests/krb5: Keep track of account DN in credentials object tests/krb5: Move padata generation methods to base class tests/krb5: add options to kdc_exchange_dict to specify including PAC-REQUEST or PAC-OPTIONS tests/krb5: Don't create PAC request manually in as_req_tests tests/krb5: Don't create PAC request or options manually in fast_tests tests/krb5: Remove magic constants tests/krb5: Allow specifying ticket flags expected to be set or reset tests/krb5: Make time assertion less strict tests/krb5: Allow Kerberos requests to be sent to DC or RODC tests/krb5: Check for presence of 'renew-till' element tests/krb5: Check 'caddr' element tests/krb5: Check for presence of 'key-expiration' element tests/krb5: Create testing accounts in appropriate containers tests/krb5: Allow specifying status code to be checked tests/krb5: Get expected cname from TGT for TGS-REQ messages tests/krb5: Get encpart decryption key from kdc_exchange_dict tests/krb5: Add get_cached_creds() method to create persistent accounts for testing tests/krb5: Generate padata for FAST tests pytest:segfault: Add test for ldb.msg_diff() ldb_msg: Don't fail in ldb_msg_copy() if source DN is NULL pyldb: Avoid use-after-free in msg_diff() tests/krb5: Sign-extend kvno from 32-bit integer tests/krb5: Add method to get RODC krbtgt credentials tests/krb5: Add get_secrets() method to get the secret attributes of a DN tests/krb5: Allow replicating accounts to the RODC tests/krb5: Create RODC account for testing tests/krb5: Allow replicating accounts to the created RODC python: Don't leak file handles python/join: Check for correct msDS-KrbTgtLink attribute tests/krb5: Add helper method for modifying PACs tests/krb5: Check correct flags element tests/krb5: Refactor tgs_req() to use _generic_kdc_exchange tests/krb5: Allow tgs_req() to send additional padata tests/krb5: Allow tgs_req() to specify different kdc-options tests/krb5: Allow tgs_req() to send requests to the RODC tests/krb5: Allow as_req() to specify different kdc-options tests/krb5: Use PAC buffer type constants from krb5pac.idl tests/krb5: Don't manually create PAC request and options in fast_tests tests/krb5: Set DN of created accounts to ldb.Dn type tests/krb5: Allow get_service_ticket() to get tickets from the RODC tests/krb5: Allow get_tgt() to get tickets from the RODC tests/krb5: Allow get_tgt() to specify different kdc-options tests/krb5: Allow get_tgt() to specify expected and unexpected flags tests/krb5: Move get_tgt() and get_service_ticket() to kdc_base_test tests/krb5: Return encpart from get_tgt() as part of KerberosTicketCreds tests/krb5: Cache obtained tickets tests/krb5: Add methods for creating zeroed checksums and verifying checksums tests/krb5: Add RodcPacEncryptionKey type allowing for RODC PAC signatures tests/krb5: Add method to verify ticket PAC checksums tests/krb5: Add method for modifying a ticket and creating PAC checksums tests/krb5: Simplify adding authdata to ticket by using modified_ticket() tests/krb5: Make get_default_enctypes() return a set of enctype constants tests/krb5: Add methods to convert between enctypes and bitfields tests/krb5: Get supported enctypes for credentials from database tests/krb5: Correctly check PA-SUPPORTED-ENCTYPES tests/krb5: Set key version number for all accounts created with create_account() tests/krb5: Allow tgs_req() to check the returned ticket enc-part tests/krb5: Add method to get DC credentials tests/krb5: Fix checking for presence of authorization data tests/krb5: Provide ticket enc-part key to tgs_req() tests/krb5: Simplify account creation tests/krb5: Add get_rodc_krbtgt_creds() to RawKerberosTest tests/krb5: Verify checksums of tickets obtained from the KDC tests/krb5: Add method to determine if principal is krbtgt tests/krb5: Add classes for testing invalid checksums pytest:segfault: Add test for deleting an ldb.Message dn pyldb: Fix deleting an ldb.Message dn pytest:segfault: Add test for deleting an ldb.Control critical flag pyldb: Fix deleting an ldb.Control critical flag s4/torture/drs/python: Fix attribute existence check pyldb: Add test for an invalid ldb.Message index type pyldb: Raise TypeError for an invalid ldb.Message index pyldb: Add tests for ldb.Message containment testing pyldb: Make ldb.Message containment testing consistent with indexing .gitlab-ci: Increase build timeout tests/krb5: Rename method parameter tests/krb5: Remove unused parameter tests/krb5: Allow for missing msDS-KeyVersionNumber attribute tests/krb5: Fix sending PA-PAC-OPTIONS and PA-PAC-REQUEST tests/krb5: Fix PA-PAC-OPTIONS checking tests/krb5: Rename allowed_to_delegate_to parameter for clarity tests/krb5: Allow created accounts to use resource-based constrained delegation tests/krb5: Add assertion to make failures clearer tests/krb5: Introduce helper method for creating invalid length checksums tests/krb5: Fix method for creating invalid length zeroed checksum tests/krb5: Fix checksum generation and verification tests/krb5: Allow excluding the PAC server checksum tests/krb5: Fix handling authdata with missing PAC tests/krb5: Fix status code checking tests/krb5: Make expected_sname checking more explicit tests/krb5: Fix assertElementFlags() tests/krb5: Remove unneeded parameters from ticket cache key tests/krb5: Fix checking for presence of error data tests/krb5: Add expect_claims parameter to kdc_exchange_dict heimdal:kdc: Only check for default salt for des-cbc-crc enctype tests/krb5: Check buffer types in PAC with STRICT_CHECKING=1 tests/krb5: Check constrained delegation PAC buffer tests/krb5: Save account SPN tests/krb5: Allow specifying options and expected flags when obtaining a ticket tests/krb5: Supply supported account enctypes in tgs_req() tests/krb5: Add parameter to enforce presence of ticket checksums tests/krb5: Add compatability tests for ticket checksums tests/krb5: Use correct principal name type tests/krb5: Clarify checksum type assertion message tests/krb5: Fix padata checking at functional level 2003 tests/krb5: Add environment variable to specify KDC FAST support tests/krb5: Check padata types when STRICT_CHECKING=0 tests/krb5: Check logon name in PAC tests/krb5: Simplify padata checking tests/krb5: Disable debugging output for tests tests/krb5: Provide clearer assertion messages for test failures tests/krb5: Fix sha1 checksum type selftest/dbcheck: Fix up RODC one-way links tests/krb5: Add TKT_SIG_SUPPORT environment variable tests/krb5: Require ticket checksums if decryption key is available tests/krb5: Verify tickets obtained with get_service_ticket() tests/krb5: Add constrained delegation tests tests/krb5: Don't include empty AD-IF-RELEVANT tests/krb5: Allow bypassing cache when creating accounts tests/krb5: Fix duplicate account creation s4:kdc: Simplify samba_kdc_update_pac_blob() to take ldb_context as parameter s4:kdc: Fix debugging messages s4/torture: Expect ticket checksum PAC buffer s4/heimdal/lib/krb5/pac.c: Align PAC buffers to match Windows heimdal: Make _krb5_pac_get_kdc_checksum_info() into a global function s4:kdc: Check ticket signature heimdal:kdc: Fix ticket signing without a PAC tests/krb5: Allow get_tgt() to request including or omitting a PAC tests/krb5: Allow specifying whether to expect a PAC with _test_as_exchange() tests/krb5: Add method to get the PAC from a ticket tests/krb5: Add tests for requesting a service ticket without a PAC tests/krb5: Ensure PAC is not present if expect_pac is false tests/krb5: Add tests for constrained delegation to NO_AUTH_DATA_REQUIRED service selftest: Increase account lockout windows to make test more realiable selftest: krb5 account creation: clarify account type as an enum tests/krb5: Decrease length of test account prefix tests/krb5: Allow specifying prefix or suffix for test account names tests/krb5: Allow creating machine accounts without a trailing dollar tests/krb5: Allow specifying the UPN for test accounts tests/krb5: Fix account salt calculation to match Windows tests/krb5: Add tests for account salt calculation tests/krb5: Check account name and SID in PAC for S4U tests CVE-2020-25722 dsdb: Add tests for modifying objectClass, userAccountControl and sAMAccountName CVE-2020-25718 tests/krb5: Allow tests accounts to replicate to RODC CVE-2020-25719 CVE-2020-25717 tests/krb5: Modify get_service_ticket() to use _generic_kdc_exchange() CVE-2020-25719 CVE-2020-25717 tests/krb5: Add pac_request parameter to get_service_ticket() CVE-2020-25722 tests/krb5: Allow creating server accounts CVE-2020-25719 tests/krb5: Add is_tgt() helper method CVE-2020-25719 tests/krb5: Add method to get unique username for test accounts MS CVE-2020-17049 tests/krb5: Allow tests to pass if ticket signature checksum type is wrong CVE-2020-25721 tests/krb5: Check PAC buffer types when STRICT_CHECKING=0 CVE-2020-25719 CVE-2020-25717 tests/krb5: Refactor create_ccache_with_user() to take credentials of target service CVE-2020-25719 CVE-2020-25717 tests/krb5: Allow create_ccache_with_user() to return a ticket without a PAC CVE-2020-25722 tests/krb5: Add KDC tests for 3-part SPNs CVE-2020-25721 ndrdump: Add tests for PAC with UPN_DNS_INFO CVE-2020-25719 tests/krb5: Add tests for requiring and issuing a PAC CVE-2020-25719 tests/krb5: Add a test for making an S4U2Self request without a PAC CVE-2020-25719 tests/krb5: Add principal aliasing test CVE-2020-25718 tests/krb5: Add tests for RODC-printed and invalid TGTs CVE-2020-25719 tests/krb5: Add tests for including authdata without a PAC CVE-2020-25721 tests/krb5: Add tests for extended PAC_UPN_DNS_INFO PAC buffer CVE-2020-25719 CVE-2020-25717 tests/krb5: Adapt tests for connecting without a PAC to new error codes CVE-2020-25722 Add test for SPN deletion followed by addition CVE-2020-25722 s4:dsdb:tests: Add missing self.fail() calls CVE-2020-25722 selftest: Adapt ldap.py tests to new objectClass restrictions CVE-2020-25718 tests/krb5: Fix indentation CVE-2020-25719 krb5pac.idl: Add PAC_ATTRIBUTES_INFO PAC buffer type CVE-2020-25719 krb5pac.idl: Add PAC_REQUESTER_SID PAC buffer type CVE-2020-25719 tests/krb5: Provide expected parameters for both AS-REQs in get_tgt() CVE-2020-25719 tests/krb5: Allow update_pac_checksums=True if the PAC is not present CVE-2020-25719 tests/krb5: Don't expect a kvno for user-to-user CVE-2020-25719 tests/krb5: Expect 'renew-till' element when renewing a TGT CVE-2020-25719 tests/krb5: Return ticket from _tgs_req() CVE-2020-25719 tests/krb5: Use correct credentials for user-to-user tests CVE-2020-25719 tests/krb5: Adjust PAC tests to prepare for new PAC_ATTRIBUTES_INFO buffer CVE-2020-25719 tests/krb5: Adjust expected error codes for user-to-user tests CVE-2020-25719 tests/krb5: tests/krb5: Adjust expected error code for S4U2Self no-PAC tests CVE-2020-25719 tests/krb5: Extend _get_tgt() method to allow more modifications to tickets CVE-2020-25719 tests/krb5: Add _modify_tgt() method for modifying already obtained tickets CVE-2020-25719 tests/krb5: Add testing for PAC_TYPE_ATTRIBUTES_INFO PAC buffer CVE-2020-25719 tests/krb5: Add testing for PAC_TYPE_REQUESTER_SID PAC buffer CVE-2020-25719 tests/krb5: Add EXPECT_PAC environment variable to expect pac from all TGS tickets CVE-2020-25719 tests/krb5: Add expected parameters to cache key for obtaining tickets CVE-2020-25719 tests/krb5: Add tests for PAC attributes buffer CVE-2020-25719 tests/krb5: Add tests for PAC-REQUEST padata CVE-2020-25719 tests/krb5: Add tests for requester SID PAC buffer CVE-2020-25719 tests/krb5: Add test for user-to-user with no sname CVE-2020-25719 tests/krb5: Add tests for mismatched names with user-to-user CVE-2020-25719 s4/torture: Expect additional PAC buffers CVE-2020-25722 pytest: Raise an error when adding a dynamic test that would overwrite an existing test CVE-2020-25719 s4:kdc: Add KDC support for PAC_ATTRIBUTES_INFO PAC buffer CVE-2020-25719 heimdal:kdc: Require authdata to be present CVE-2020-25718 kdc: Return ERR_POLICY if RODC krbtgt account is invalid CVE-2020-25719 s4:kdc: Add KDC support for PAC_REQUESTER_SID PAC buffer CVE-2020-25719 heimdal:kdc: Check return code CVE-2020-25719 heimdal:kdc: Move fetching krbtgt entry to before enctype selection CVE-2020-25719 heimdal:kdc: Use sname from request rather than user-to-user TGT client name CVE-2020-25719 heimdal:kdc: Check name in request against name in user-to-user TGT CVE-2020-25719 heimdal:kdc: Verify PAC in TGT provided for user-to-user authentication CVE-2020-25719 heimdal:kdc: Require PAC to be present CVE-2020-25718 tests/krb5: Only fetch RODC account credentials when necessary CVE-2020-25719 tests/krb5: Add tests for using a ticket with a renamed account CVE-2020-25718 heimdal:kdc: Add comment about tests for tickets of users not revealed to an RODC CVE-2020-25722 selftest: Add test for duplicate servicePrincipalNames on an add operation CVE-2020-25722 selftest: Ensure check for duplicate servicePrincipalNames is not bypassed for an add operation CVE-2020-25717: tests/krb5: Add method to automatically obtain server credentials CVE-2020-25717: nsswitch/nsstest.c: Lower 'non existent uid' to make room for new accounts CVE-2020-25717: selftest: turn ad_member_no_nss_wb into ad_member_idmap_nss CVE-2020-25717: tests/krb5: Add a test for idmap_nss mapping users to SIDs CVE-2021-3670 tests/krb5/test_ldap.py: Add test for LDAP timeouts CVE-2021-3670 ldap_server: Set timeout on requests based on MaxQueryDuration CVE-2021-3670 ldap_server: Ensure value of MaxQueryDuration is greater than zero Luke Howard (6): CVE-2021-3671 HEIMDAL kdc: validate sname in TGS-REQ kdc: KRB5KDC_ERR_{C,S}_PRINCIPAL_UNKNOWN if missing field krb5: return KRB5KRB_AP_ERR_INAPP_CKSUM if PAC checksum fails kdc: only set HDB_F_GET_KRBTGT when requesting TGS principal kdc: use ticket client name when signing PAC kdc: correctly generate PAC TGS signature Martin Schwenke (37): ctdb-recoverd: Add a helper variable ctdb-recoverd: Update the local node map before pushing out flags ctdb-recoverd: Push flags for a node if any remote node disagrees ctdb-protocol: Add new controls to disable and enable nodes ctdb-protocol: Add marshalling for controls DISABLE_NODE/ENABLE_NODE ctdb-daemon: Add a helper variable ctdb-daemon: Factor out a function to get node structure from PNN ctdb-daemon: Start as disabled means PERMANENTLY_DISABLED ctdb_daemon: Implement controls DISABLE_NODE/ENABLE_NODE ctdb-client: Add client code for disable/enable controls ctdb-tools: Use disable and enable controls in tool ctdb-daemon: Correct the condition for logging unchanged flags ctdb-daemon: Update logging for flag changes ctdb-daemon: Modernise remaining debug macro in this function ctdb-daemon: Don't bother sending CTDB_SRVID_SET_NODE_FLAGS ctdb-recoverd: Mark CTDB_SRVID_SET_NODE_FLAGS obsolete ctdb-daemon: Simplify ctdb_control_modflags() ctdb-daemon: Ignore flag changes for disconnected nodes ctdb-daemon: Don't mark a node as unhealthy when connecting to it ctdb-tests: Fix typo in ctdb stub comment matching ctdb-tests: Drop unused function ctdb_get_all_public_addresses() debug: Move header_str and hs_len to state debug: Add a level of indirection to ring buffer logging debug: Factor out function copy_no_nl() debug: Avoid debug header being separated from debug text debug: Add length argument to Debug1() debug: Push message length argument down to backend log functions debug: Rename variable for consistency debug: Optimise construction of header_str_no_nl debug: Optimise to avoid walking the header string debug: Optimise early return when header string buffer is full debug: Move msg_no_nl to state debug: Optimise construction of msg_no_nl bootstrap: Add Debian 11 bootstrap: Debian 11 has liburing-dev debug: Add debug_syslog_format setting debug: Add new smb.conf option "debug syslog format" Matthew Grant (4): libcli/dns: dns forwarder port doc changes lib/tsocket: new function to parse host port strs. libcli/dns: smb.conf dns forwarder port support libcli/dns.c: dns forwarder port test changes Michael Adam (1): lib:cmdline: fix a comment Nadezhda Ivanova (2): CVE-2020-25722: s4-acl: test Control Access Rights honor the Applies-to attribute CVE-2020-25722: s4-acl: Make sure Control Access Rights honor the Applies-to attribute Nicolas Williams (1): krb5: Fix PAC signature leak affecting KDC Noel Power (1): s4: torture: CHECK ret value and fail if false Pavel Filipenský (4): krb5_wrap: remove unused code s3:winbindd: Fix winbindd child logfile name handling docs-xml: Update winbindd(8) manpage s3:librpc: Improve calling of krb5_kt_end_seq_get() Ralph Boehme (101): smbd: drop requirement for full open for READ_CONTROL_ACCESS, WRITE_DAC_ACCESS and WRITE_OWNER_ACCESS smbd: only open full fd for directories if needed selftest: add a test for the "deadtime" parameter s3/rpc_server: track the number of policy handles with a talloc destructor libreplace: properly give headers to conf.CHECK_CODE when checking for copy_file_range_syscall libreplace: properly execute SYS_copy_file_range check vfs_default: detect EOPNOTSUPP and ENOSYS errors from copy_file_range() libreplace: remove now unused USE_COPY_FILE_RANGE define s3/lib/dbwrap: check if global_messaging_context() succeeded registry: check for running as root in clustering mode smbd: avoid calling creating a pathref in smb_set_file_dosmode() vfs_gpfs: call SMB_VFS_NEXT_CONNECT() before running some module initialization code vfs_gpfs: make vfs_gpfs_connect() a no-op on IPC shares vfs_gpfs: check for O_PATH support in gpfswrap_fstat_x() vfs_gpfs: add path based fallback for gpfswrap_fstat_x() on pathref handles vfs_gpfs: remove ENOSYS fallback from vfs_gpfs_fset_dos_attributes() vfs_gpfs: add sys_proc_fd_path() fallback to vfs_gpfs_fset_dos_attributes() vfs_gpfs: deal with pathref fsps in vfs_gpfs_fntimes() vfs_gpfs: pass fsp to smbd_gpfs_set_times() vfs_gpfs: remove ENOSYS fallback from vfs_gpfs_fntimes() lib/gpfswrap: add gpfs_set_times_path() wrapper vfs_gpfs: deal with pathrefs fsps in smbd_gpfs_set_times() winbindd: call wb_parent_idmap_setup_send() in wb_queryuser_send() winbind: ensure wb_parent_idmap_setup_send() gets called in winbindd_allocate_uid_send() lib/cmdline: add POPT_COMMON_DAEMON daemon popt options lib/cmdline: restore pre-4.15 logging behaviour for daemons smbd: use POPT_COMMON_DAEMON nmbd: use POPT_COMMON_DAEMON winbindd: use POPT_COMMON_DAEMON s4/samba: POPT_COMMON_DAEMON lib/replace: drop runtime copy_file_range() check selftest: fix ---configfile option manpages: remove duplicate options from smbclient lib/cmdline: restore s3 option name --max-protocol for MAXPROTOCOL from 4.14 selftest: remove unsupported smbcacls option --get texpect: don't ignore unknown options smbstatus: don't ignore unknown options s4/smbclient: don't ignore unknown options nmblookup: don't ignore unknown options source3/lib/smbconf: don't ignore unknown options s3/param: don't ignore unknown options rpcclient: don't ignore unknown options pdbtest: don't ignore unknown options vfstest: don't ignore unknown options s3/async-tracker: don't ignore unknown options log2pcaphex: don't ignore unknown options mvxattr: don't ignore unknown options nmblookup: don't ignore unknown options ntlm_auth: don't ignore unknown options pdbedit: don't ignore unknown options profiles: don't ignore unknown options regedit: don't ignore unknown options sharesec: don't ignore unknown options smbcacls: don't ignore unknown options smbcquotas: don't ignore unknown options smbget: don't ignore unknown options smbtree: don't ignore unknown options split_tokens: don't ignore unknown options testparm: don't ignore unknown options s4/cifsdd: don't ignore unknown options s4/regdiff: don't ignore unknown options s4/regpatch: don't ignore unknown options s4/regshell: don't ignore unknown options s4/regtree: don't ignore unknown options s4/torture/gentest: don't ignore unknown options s4/torture/locktest: don't ignore unknown options s4/torture/masktest: don't ignore unknown options vfs_btrfs: fix btrfs_fget_compression() smbd: fix "ea support = no" registry: skip root check when running with uid-wrapper enabled idl: declare token array of storage_offload_token as in-line vfs: Add flags and xferlen args to SMB_VFS_OFFLOAD_READ_RECV lib: add sys_block_align[_truncate]() vfs: add and use a few SMB_VFS_ODX defines ctdb-scripts: filter out comments in public_addresses file ctdb-tests: add a comment to the generated public_addresses file used by eventscript UNIT tests selftest: add a test ignored spotlight/elasticsearch mapping failures mdssvc: prepare for ignore attribute and type mapping errors mdssvc: add options to allow ignoring attribute and type mapping errors docs: document new Spotlight Elasticsearch options lib: add NTTIME_THAW lib: fix null_nttime() tests lib: use NTTIME_FREEZE in a null_nttime() test lib: update null_nttime() of -1: -1 is NTTIME_FREEZE lib: add a test for null_nttime(NTTIME_THAW) torture: add a test for NTTIME_FREEZE and NTTIME_THAW lib: handle NTTIME_THAW in nt_time_to_full_timespec() vfs_fruit: remove a fsp check from ad_fset() smbd: early out in is_visible_fsp() CI: add a test for bug 14882 lib/dbwrap: reset deleted record to tdb_null CVE-2020-25717: s3:auth: remove fallbacks in smb_getpwnam() source3: move lib/substitute.c functions out of proto.h samba-bgqd: fix startup and logging winbindd: remove is_default_dyn_LOGFILEBASE() logic lib/debug: fix fd check before dup'ing to stderr lib/debug: in debug_set_logfile() call reopen_logs_internal() lib/cmdline: fix indentation lib/cmdline: remember config_type in samba_cmdline_init() lib/cmdline: setup default file logging for servers smbd: get rid of get_file_handle_for_metadata() Samuel Cabrero (8): s3: rpc_server: Avoid creating new handles when received an empty policy_handle pidl:NDR/ServerCompat.pm: Do not register disabled services librpc:core: Add a function to register an interface passing the binding handle s3:rpc_server: Do not use the default ncalrpc endpoint for external services CVE-2020-25717: loadparm: Add new parameter "min domain uid" CVE-2020-25717: selftest: Add ad_member_no_nss_wb environment CVE-2020-25717: selftest: Add a test for the new 'min domain uid' parameter CVE-2020-25717: s3:auth: Check minimum domain uid Stefan Metzmacher (68): gnutls: allow gnutls_aead_cipher_encryptv2 with gcm before 3.6.15 s4:torture/smb2: add tests to check all signing and encryption algorithms s3:smbd: really support AES-256* in the server winbindd_pam: add NT4 DC handling into winbind_samlogon_retry_loop() s3:libsmb: start encryption as soon as possible after the session setup s3:libsmb: close the temporary IPC$ connection in cli_full_connection() wafsamba: add support git worktree to vcs_dir_contents() script/bisect-test.py: add support git worktree wscript: fix installing pre-commit with 'git worktree' wafsamba: always generate compile_commands.json again, but only when the samba dependencies changed vfs_gpfs: don't check for struct gpfs_config_data in vfs_gpfs_[l]stat() docs-xml: use upper case for "{client,server} smb3 {signing,encryption} algorithms" values lib/cmdline: fix --configfile handling of POPT_COMMON_CONFIG_ONLY used by ntlm_auth smbclient: don't ignore unknown options libcli/smb: use MID=0 for SMB2 Cancel with ASYNC_ID and legacy signing algorithms netlogon_creds_cli: add netlogon_creds_cli_SendToSam_recv() and don't ignore result selftest/Samba3: remove unused close(USERMAP); calls selftest/Samba3: replace (winbindd => "yes", skip_wait => 1) with (winbindd => "offline") s3/libsmb: check for global parametric option "libsmb:client_guid" CVE-2020-25719 CVE-2020-25717 tests/krb5: Add tests for connecting to services anonymously and without a PAC CVE-2020-25719 CVE-2020-25717: selftest: remove "gensec:require_pac" settings CVE-2020-25717: s3:winbindd: make sure we default to r->out.authoritative = true CVE-2020-25717: s4:auth/ntlm: make sure auth_check_password() defaults to r->out.authoritative = true CVE-2020-25717: s4:torture: start with authoritative = 1 CVE-2020-25717: s4:smb_server: start with authoritative = 1 CVE-2020-25717: s4:auth_simple: start with authoritative = 1 CVE-2020-25717: s3:ntlm_auth: start with authoritative = 1 CVE-2020-25717: s3:torture: start with authoritative = 1 CVE-2020-25717: s3:rpcclient: start with authoritative = 1 CVE-2020-25717: s3:auth: start with authoritative = 1 CVE-2020-25717: auth/ntlmssp: start with authoritative = 1 CVE-2020-25717: s3:auth: let auth3_generate_session_info_pac() forward the low level errors CVE-2020-25717: s3:auth: we should not try to autocreate the guest account CVE-2020-25717: s3:auth: no longer let check_account() autocreate local users CVE-2020-25717: s3:lib: add lp_allow_trusted_domains() logic to is_allowed_domain() CVE-2020-25717: s3:auth: don't let create_local_token depend on !winbind_ping() CVE-2020-25719 CVE-2020-25717: auth/gensec: always require a PAC in domain mode (DC or member) CVE-2020-25719 CVE-2020-25717: s4:auth: remove unused auth_generate_session_info_principal() CVE-2020-25717: s3:ntlm_auth: fix memory leaks in ntlm_auth_generate_session_info_pac() CVE-2020-25717: s3:ntlm_auth: let ntlm_auth_generate_session_info_pac() base the name on the PAC LOGON_INFO only CVE-2020-25717: s3:auth: let auth3_generate_session_info_pac() delegate everything to make_server_info_wbcAuthUserInfo() CVE-2020-25717: selftest: configure 'ktest' env with winbindd and idmap_autorid CVE-2020-25717: s3:auth: let auth3_generate_session_info_pac() reject a PAC in standalone mode CVE-2020-25717: s3:auth: simplify get_user_from_kerberos_info() by removing the unused logon_info argument CVE-2020-25717: s3:auth: simplify make_session_info_krb5() by removing unused arguments CVE-2020-25722 pytests: Give computer accounts unique (and valid) sAMAccountNames and SPNs CVE-2021-23192: dcesrv_core: add better debugging to dcesrv_fault_disconnect() CVE-2021-23192: dcesrv_core: add dcesrv_fault_disconnect0() that skips DCERPC_PFC_FLAG_DID_NOT_EXECUTE CVE-2021-23192: python/tests/dcerpc: change assertNotEquals() into assertNotEqual() CVE-2021-23192: python/tests/dcerpc: let generate_request_auth() use g_auth_level in all places CVE-2021-23192: python/tests/dcerpc: fix do_single_request(send_req=False) CVE-2021-23192: python/tests/dcerpc: add tests to check how security contexts relate to fragmented requests CVE-2021-23192: dcesrv_core: only the first fragment specifies the auth_contexts CVE-2016-2124: s4:libcli/sesssetup: don't fallback to non spnego authentication if we require kerberos CVE-2016-2124: s3:libsmb: don't fallback to non spnego authentication if we require kerberos CVE-2021-3738 s4:torture/drsuapi: don't pass DsPrivate to test_DsBind() CVE-2021-3738 s4:torture/drsuapi: maintain priv->dc_credentials CVE-2021-3738 s4:torture/drsuapi: maintain priv->admin_credentials CVE-2021-3738 s4:torture/drsuapi: DsBindAssocGroup* tests CVE-2021-3738 auth_util: avoid talloc_tos() in copy_session_info() CVE-2021-3738 s4:rpc_server/common: provide assoc_group aware dcesrv_samdb_connect_as_{system,user}() helpers CVE-2021-3738 s4:rpc_server/drsuapi: make use of assoc_group aware dcesrv_samdb_connect_as_*() helpers CVE-2021-3738 s4:rpc_server/dnsserver: make use of dcesrv_samdb_connect_as_user() helper CVE-2021-3738 s4:rpc_server/lsa: make use of dcesrv_samdb_connect_as_user() helper CVE-2021-3738 s4:rpc_server/netlogon: make use of dcesrv_samdb_connect_as_*() helper CVE-2021-3738 s4:rpc_server/samr: make use of dcesrv_samdb_connect_as_*() helper s3:winbindd: fix "allow trusted domains = no" regression CVE-2020-25727: idmap_nss: verify that the name of the sid belongs to the configured domain Uri Simchoni (11): fuzzing/oss-fuzz: fix image build recipe for Ubuntu 20.04 configure: allow configure script to accept parameters with spaces fuzzing/oss-fuzz: fix RPATH comments for post-Ubuntu-16.04 era fuzzing/oss-fuzz: fix samba build script for Ubuntu 20.04 fuzzing/oss-fuzz: strip RUNPATH from dependencies gitlab-ci: run samba-fuzz autobuild target on Ubuntu 20.04-based image selftest: add a unit test for tsocket_address_inet_from_strings tsocket: set errno on some failures of tsocket_address_inet_from_strings WHATSNEW: document dns forwarder change selftest: add more tests for test_address_inet_from_strings selftest: test tsocket_address_inet_from_hostport_strings Viktor Dukhovni (1): HEIMDAL:kdc: Fix transit path validation CVE-2017-6594 Volker Lendecke (145): samba-bgqd: Fix samba-bgqd with "clustering=yes"/"include=registry" docs: Add vfs_expand_msdfs manpage rpcclient: Align integer types lib: Fix a potential error path memleak lib;smbd: Fix the -Os build by initializing variables samdb: Fix an uninitialized variable read net3: Save a few lines with any_nt_status_not_ok() net3: Simplify name_to_sid(): dom_sid_parse checks for "S-" prefix net: Align some integer types libnetapi: Save lines with any_nt_status_not_ok() rpc_client: Simplify rpc_pipe_bind_step_one_done() rpc_client: Replace ZERO_STRUCTP with struct assignment rpc_client: Simplify create_rpc_bind_req() rpc_client: Save 65 .text bytes with -Os rpc_client: Avoid two casts with proper printf specifiers lib: Use TALLOC_FREE() in data_blob_free() libsmbclient: Avoid a call to SMBC_errno() in SMBC_chmod_ctx() libsmbclient: Avoid a call to SMBC_errno() in SMBC_open_ctx() libsmbclient: Avoid a call to SMBC_errno() in SMBC_read_ctx() libsmbclient: Avoid a call to SMBC_errno() in SMBC_splice_ctx() libsmbclient: Avoid a call to SMBC_errno() in SMBC_attr_server() libsmbclient: Avoid a call to SMBC_errno() in SMBC_notify_ctx() net: Use dbwrap_do_locked() in wipedbs_delete_records() smbd: Fix fetch_share_mode_send() error return smbd: Simplify mark_share_mode_disconnected() librpc: Simplify GUID_zero() with a direct struct return librpc: Simplify GUID_string2() by using GUID_buf_string() librpc: Simplify GUID_hexstring() rpc_server: Simplify open_np_file() rpc_server: Slightly simplify set_user_info_21() rpc_server: Slightly simplify set_user_info_18() rpc_server: Remove an unused function declaration rpc_server: Align integer types rpc_server: Simplify _samr_CreateUser2() rpc_server: Fix a comment lib: Improve comment wording rpc_client: Slightly simplify rpc_transport_np_init_pipe_open() libsmb: Fix a typo rpc_client: Fix a small memleak rpc_client: Early TALLOC_FREE() in prepare_verification_trailer() rpc_client: Slightly simplify rpc_api_pipe_req_send() rpc_client: Adapt rpc_api_pipe_req_send() to talloc_req conventions rpc_client: Avoid ZERO_STRUCTP in prepare_verification_trailer() rpc_client: Adapt rpc_pipe_bind_send() to talloc_req conventions rpc_client: Use struct init/assignment rpc_client: Use ndr_syntax_id_equal() in check_bind_response() rpc_client: Adapt rpc_api_pipe_send() to recent coding conventions rpc_client: Adapt rpc_write_send() to tevent_req conventions winbind: Remove an unused include rpc_client: Simplify rpccli_bh_disconnect_recv() rpc_client: Use tevent_req_nterror() properly rpc_client: Avoid casts rpc_client: Simplify rpc_api_pipe_auth3_done() rpc_client: Simplify get_complete_frag_got_rest() rpc_client: Simplify get_complete_frag_got_header() rpc_client: Simplify get_complete_frag_got_header() rpc_client: Simplify get_complete_frag_send() torture: Remove rpc_open_tcp test program rpc_client: Make rpc_pipe_open_tcp() static rpc_client: Use tevent_req_nterror() properly in cli_api_pipe rpc_client: Align cli_api_pipe_send() with tevent_req() conventions winbindd: NULL-initialize a pointer rpcclient: Add unixinfo commands rpc_server3: Include the right "dcerpc.h" from a SAMBA_SUBSYSTEM auth: Simplify is_our_machine_account() auth: Fix a typo samba-tool: Fix a typo samba_dnsupdate: Fix deprecation warnings smbtorture: Fix epmapper.Map_full test debug: Remove "override_logfile" lib: Simplify sid_linearize() samba-bgqd: Enable smbcontrol pool-usage rpc_server4: Fix a typo winbind: Fix a typo lib: Add required #includes lib: Give util_specialsids.c its own prototype header lib: Avoid an "includes.h" samba-bgqd: Convert closeall_*() to closefrom_*() lib: Move closefrom_except*() to a separate file libcli: Remove unused security_token_is_sid_string() rpc_server: Move a type check in dcesrv_handle_lookup() rpc_server: Simplify dcesrv_handle_lookup() mdssvc: Use ndr_policy_handle_empty() smbd: Make SID_SAMBA_SMB3 a static SID rpc_server3: Avoid a literal number available as a constant lsa_server3: Align integer types smbd: Avoid ZERO_STRUCT() with a struct init samba: Save a line with TALLOC_FREE libcli: Remove unused security_token_has_sid_string() libcli: Introduce a helper variable in security_session_user_level() libcli: Simplify security_session_user_level() lib: Avoid a cast in a DBG statement lib: Simplify set_privileges with a struct initialization lib: Fix a typo in a DEBUG fn prefix by using DBG_ idmap_script: Save a few lines with str_list_add_printf() libcli: Avoid an includes.h libcli: Align integer types rpc_server3: Remove unused fields from struct dcerpc_ncacn_conn winbind: Align an integer type lib: Add talloc_asprintf_addbuf() librpc: Use talloc_asprintf_addbuf() in dcerpc_binding_string() lib: Use talloc_asprintf_addbuf() in utok_string() winbind: Simplify winbindd_getsidaliases_recv() winbind: Simplify winbindd_getusersids_recv() winbind: Simplify winbindd_sids_to_xids_recv() dsdb: Simplify schema_attribute_description() & friends libcli: Simplify get_sec_mask_str() rpc_server3: Remove "pipes_struct->call_id" rpc_server3: Remove "pipes_struct->opnum" rpc_server3: Remove an outdated comment netlogon: Move netlogon_server_pipe_state to netlogon.idl rpc_server3: Use dcesrv_iface_state in netlogon3 rpc_server3: Remove pipes_struct->private_data smbd: reopen logs on SIGHUP for notifyd and cleanupd smbd: Give smbXsrv_open.c its own header file smbd: Remove unused "struct connections_key" libsmb: Use cli_ntcreate in cli_chkpath smbclient: Use cli_checkpath in "cd" command libsmb: Remove "trans_oob()" macro libcli: "smb_util.h" needs "ntstatus.h" libsmb: Give reparse_symlink.c its own header libsmb: Introduce "struct symlink_reparse_struct" libsmb: Avoid a talloc_stackframe.c dependency libsmb: move reparse_symlink to libcli/smb/ VFS: Fix a typo libcli: Remove NT_STATUS_INACCESSIBLE_SYSTEM_SHORTCUT error code lib: Fix a debug typo in g_lock.c dbwrap: Remove unused dbwrap_watched_wakeup() libsmb: Move cli_qfilename() to its only user in torture.c smb.conf.5: Fix a typo for "username map script" smbd: Fix a typo vfs: Fix a few typos libcli4: Remove outdated README file lib: Slightly tune cp_smb_filename_nostream() smbd: Move "struct fd_handle" into fd_handle.c vfs: Use cp_smb_filename_nostream() in vfswrap_parent_pathname() smbd: Fix typos smbd: Avoid casts smbd: Make sure we don't overwrite tmp_buf lib: Use a direct struct initialization smbd: Convert ret==false into !ret selftest: Add reproducer for bug 14908 lib: Add required includes to source3/include/secrets.h cmdline: Add a callback to set the machine account details cmdline: Make -P work in clustered mode eaglegai (1): fix undefined-shift in put_res_rec fuzz error: ../../source3/libsmb/nmblib.c:451:4: runtime error: left shift of 65312 by 16 places cannot be represented in type 'int' ----------------------------------------------------------------------- -- Samba Shared Repository