The annotated tag, samba-4.15.0rc1 has been created at d3c94a1c4139d35d4d700f24a7f8ea8f6331f27d (tag) tagging 6a6f60447719d274011bd9575403f2fb0099ca91 (commit) replaces ldb-2.4.0 tagged by Karolin Seeger on Thu Jul 15 10:52:04 2021 +0200
- Log ----------------------------------------------------------------- samba: tag release samba-4.15.0rc1 -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEgfXigyvSVFoYl7cTqplEL7aAtiAFAmDv9zQACgkQqplEL7aA tiAScg/8DPnmSVPkFqcA9O6ijC0iP7Aj8ECoOJNEMcOsrEXK0Vgu0o4B7+5lf8kb AN6pEEyYQokfXR0noEmSkVhtEkf8kLC9ayAMzpxQCEWiwf2949C8YQ2CgCrLrCGm kIoSlQdGsJQjDbqlwvZFatDaR0fjGlDHycgzT/IfvaCskwWnKo5JjxrUZmGSgpv3 Tg04NQZiieJf09j88qhXIot9gjUQdnuy5ws06b2+QnnRbZWz8edW9M8ybzQ2hBk/ mow7M1Rz1CdTejqryFg2d9zbQ8RPfvykiowm5+nUDjdiqtYq178DIY8EJNcrrl88 ShI0TYHm/KI5a+1/PZKovzF1KiDcSGyxSIQRJOb4+SI/VuIs9x0vFSceANZsuJYV iXB8stlyd2z2snzQjIbC3buDbBnLwjqFbsJZq9vPhRMpHdclFGsbZw1sTU2e/IB5 l6nIspUbtUjoAWDYs56aTkiabz0BWrXF2U+mZh61CfPdoGGfPHV/s410BKfxhBlb V3481YCsMlMCWkVpyAQx8AezF+KPvPRD5kUFTKqUiT3D23M5YbS3cVTB3LQsKgWQ ONSDGmastuIk4HuQ5th6DZxkSOKVAMlUEEwjw/UGSWfuKJS2eBM91qMF1sAAGT0p vrSIuGkzU6XPLhJiHB6SE/GoT9naiPhK4NfnOPUk8ggt/IP8iRg= =ZMh0 -----END PGP SIGNATURE----- Jeremy Allison (7): s3: tests: Our tests for "smbd async dosmode = yes" haven't been working correctly as the parameter has been set incorrectly. s3: tests: Add "SMB2-LIST-DIR-ASYNC" test. s3: smbd: Allow "smbd async dosmode = yes" to return valid DOS attributes again. s3: VFS: default: Move vfswrap_fgetxattr() before the async versions. s3: VFS: default: Add 'handle' member to struct vfswrap_getxattrat_state s3: VFS: default. In vfswrap_getxattrat_do_sync() always use the pathref fsp. s3: VFS: default. In vfswrap_getxattrat_do_async() always use the pathref fsp. Karolin Seeger (3): WHATSNEW: Fix typos. WHATSNEW: Up to Samba 4.15.0rc1. VERSION: Disable GIT_SNAPSHOT for the Samba 4.15.0rc1 release. Stefan Metzmacher (61): s3:tests: use SAMBA_DEPRECATED_SUPPRESS=1 for backbox tests selftest: use SAMBA_DEPRECATED_SUPPRESS=1 for all tests s4:torture:libsmbclient: make use of PROTOCOL_* enum values instead of of hardcoded int values libcli/smb: no longer use experimental dialects 2.2.2, 2.2.4, 3.1.0 on the wire smb2_negprot: no longer use experimental dialects 2.2.2, 2.2.4, 3.1.0 on the wire s3:torture: replace PROTOCOL_SMB2_22 with PROTOCOL_SMB3_00 s3:smbd: replace PROTOCOL_SMB2_22 with PROTOCOL_SMB3_00 libcli/smb: replace PROTOCOL_SMB2_22 with PROTOCOL_SMB3_00 docs-xml: remove support for "SMB2_22" libcli/smb: remove unused PROTOCOL_SMB2_22 definition s3:smbd: replace PROTOCOL_SMB2_24 with PROTOCOL_SMB3_00 libcli/smb: replace PROTOCOL_SMB2_24 with PROTOCOL_SMB3_00 docs-xml: remove support for "SMB2_24" libcli/smb: remove unused PROTOCOL_SMB2_24 definition s3:smbd: replace PROTOCOL_SMB3_10 with PROTOCOL_SMB3_11 libcli/smb: replace PROTOCOL_SMB3_10 with PROTOCOL_SMB3_11 docs-xml: remove support for "SMB3_10" libcli/smb: remove unused PROTOCOL_SMB3_10 definition WHATSNEW: document the removal of SMB2_22, SMB2_24 and SMB3_10 s4:torture: let smb2.session.bind_negative_* also test without session keys s4:torture: let smb2.session.bind_negative_* tests also use a different client guid s3:smbd: let smb2srv_session_lookup_global() clear the signing/encryption_flags s3:smbd: fix a NULL pointer deference caused by smb2srv_update_crypto_flags() s3:smbd: make sure smbXsrv_session_update() doesn't segfault with table == NULL s3:smbd: remove dead code from smbd_smb2_request_dispatch() s3:smbd: fallback to smb2srv_session_lookup_global() for session setups with failed signing lib/param: add lpcfg_parm_is_unspecified() helper lib/param: enable "server multi channel support" by default on Linux and FreeBSD WHATNEW: document "server multi channel support" change smb2_negprot: make use of struct smb311_capabilities.encryption docs-xml: add "client/server smb3 encryption algorithms" options libcli/smb: add helpers to parse client/server smb3 encryption algorithms into struct smb311_capabilities s3:libsmb: make use of 'client smb3 encryption algorithms' s4:param: make use of 'client smb3 encryption algorithms' s3:smbd: make use of 'server smb3 encryption algorithms' libcli/smb: let 'client smb3 encryption algorithms' disable aes-128-ccm for SMB3_0* libcli/smb: add smb311_capabilities_check() helper s3:smbd: let 'server smb3 encryption algorithms' disable aes-128-ccm for SMB3_0* libcli/smb: add aes-256-{gcm,ccm} support to smb2_signing_[en|de]crypt_pdu() lib/param: offer aes-256-{gcm,ccm} encryption by default libcli/smb: add SMB2_TRANSPORT_CAPABILITIES related defines to smb2_constants.h libcli/smb: add SMB2_RDMA_TRANSFORM_CAPABILITIES related defines to smb2_constants.h libcli/smb: add SMB2_SIGNING_CAPABILITIES related defines to smb2_constants.h s3:smbd: only allow cancel with the same session s3:smbstatus: pretty print the use of new signing/encryption algorithms s3:smbd: make sure STATUS_PENDING responses are never signed s3:smbd: make sure we don't try to sign CANCEL response PDUs libcli/smb: add smb2cli_conn_server_{signing,encryption}_algo() libcli/smb: skip session setup signing for REQUEST_OUT_OF_SEQUENCE, NOT_SUPPORTED and ACCESS_DENIED libcli/smb: make sure we always send a valid MID in cancel PDUs libcli/smb: make sure smb2_signing_calc_signature() never generates a signature without a valid MID libcli/smb: prepare support for SMB2_SIGNING_CAPABILITIES negotiation s3:smbd: prepare support for SMB2_SIGNING_CAPABILITIES docs-xml: add "client/server smb3 signing algorithms" options libcli/smb: actually make use of "client/server smb3 signing algorithms" s4:torture: force AES_CMAC or HMAC_SHA256 for some SMB 3.1.1 tests libcli/smb: add support for SMB2_SIGNING_AES128_GMAC docs-xml: offer aes-128-gmac by default s4:torture: more smb2.session.bind_negative_smb3* combinations s3:smbd: improve the error returns for invalid session binding requests WHATSNEW: add client/server smb3 signing/encryption algorithms ----------------------------------------------------------------------- -- Samba Shared Repository