The annotated tag, ldb-2.9.2 has been created
at df5b48e267c2a293f4a055a2ae6d0497d5a94970 (tag)
tagging 42bfbb012f9c1c9054cdfb510ae4a50a3f12b384 (commit)
replaces samba-4.20.5
tagged by Jule Anger
on Tue Nov 19 15:43:10 2024 +0100
- Log -----------------------------------------------------------------
ldb: tag release ldb-2.9.2
-----BEGIN PGP SIGNATURE-----
iQEzBAABCgAdFiEEkUejOXGVGO6QEby1R5ORYRMIQCUFAmc8o/4ACgkQR5ORYRMI
QCWBJQf+OIa3SBSYMDYhde1m1GbW4V6cTmbqYW3//D45VU4KWvspWDuLbeMVLGmS
vfYSyNDbARzgU4TW5yg05F670FPVuNr9XZ1wJjFGiwBPZehWTVNuR8+sH1FSiaEj
Tc2SeJHdJdUczTBBAw6UFMmgjzXwV285Qa7twJWApGSwnOMQGNU44hZ06SN+4P5h
AczAlSsJ7PnvpDPN81Zh2YnItUhU8MEhI0Pw355vz6cR6zJ2+3uZZaX92ysCJtwu
ZdC+04rRlgBshRwtJ5PhOcwYzTJUfEkK8w8WHx6B5pn6V1X2V3OBrFWBzg4PVEjG
B8PZqS0uhwQ2cg0XYQiWYWe90sNF0g==
=ITgM
-----END PGP SIGNATURE-----
Andréas Leroux (1):
netcmd:domain:policy: Fix missing conversion from tgt_lifetime minutes to
10^(-7) seconds
Christof Schmitt (1):
shadow_copy2: Ignore VFS_OPEN_HOW_WITH_BACKUP_INTENT
Douglas Bagnall (3):
ldb_kv_index: dn_list load sub transaction can re-use keys
ldb:kv_index: realloc away old dn list
ldb:kv_index: help static analysers to not worry (CID 1615192)
Jo Sutton (1):
s4:rpc_server: Make some arrays static
Jones Syue (1):
s3: SIGHUP handlers use consistent log level 3
Jule Anger (2):
VERSION: Bump version up to Samba 4.20.6...
BUG 15590 ldb: Release LDB 2.9.2
Ralph Boehme (14):
s3/lib: add next helper variable in server_id_watch_*
s3/lib: add option "serverid watch:debug = yes" to print kernel stack of
hanging process
s3/lib: add option "serverid watch:debug script"
smbd: log share_mode_watch_recv() errors as errors
smbd: add option "smbd lease break:debug hung procs"
smbd: move trace_state variable behind tv variable
smbd: add option "smbd:debug events" for tevent handling duration
threshold warnings
smbd: consolidate DH reconnect failure code
smbd: remove just created sharemode entry in the error codepaths
smbtorture: prepare test_overwrite_read_only_file() for more subtests
smbtorture: fix smb2.notify.mask test
smbtorture: add subtests for overwrite dispositions vs sharemodes
smbd: fix share access check for overwrite dispostions
smbd: fix sharing access check for directories
Stefan Metzmacher (114):
vfs_error_inject: add 'error_inject:durable_reconnect = st_ex_nlink'
s4:torture/smb2: add
smb2.durable-v2-regressions.durable_v2_reconnect_bug15624
s3:tests: let test_durable_handle_reconnect.sh run
smb2.durable-v2-regressions.durable_v2_reconnect_bug15624
s4:lib/messaging: fix interaction between imessaging_reinit and
irpc_destructor
s4:torture/smb2: improve error handling in durable_open.c
s4:torture/smb2: improve error handling in durable_v2_open.c
s4:torture/smb2: add smb2.durable-open.lock-noW-lease
s4:torture/smb2: add smb2.durable-v2-open.lock-{oplock,lease,noW-lease}
s3:smbd: only store durable handles with byte range locks when having
WRITE lease
s4:torture/smb2: add
smb2.durable-v2-open.{[non]stat[RH]-and,two-same,two-different}-lease
s4:torture/smb2: add smb2.durable-v2-open.{keep,purge}-disconnected-*
tests
s3:smbd: let durable_reconnect_fn already check for a disconnected handle
with the correct file_id
s3:smbd: allow reset_share_mode_entry() to handle more than one durable
handle
s3:smbd: avoid false positives for got_oplock and have_other_lease in
delay_for_oplock_fn
s4:tortore/rpc: let rpc.backupkey without privacy pass against Windows
2022
RawDCERPCTest: ignore errors in smb_pipe_socket.close()
tests/dcerpc/raw_protocol: pass against Windows 2022 and require special
env vars for legacy servers
s4:selftest: only run ad_member with AUTH_LEVEL_CONNECT_LSA=1
dcesrv_core: disconnect after a fault with non AUTH_LEVEL_CONNECT bind
dcesrv_core: return NAK_REASON_PROTOCOL_VERSION_NOT_SUPPORTED for binds
without contexts
tests/dcerpc/raw_protocol: add more test for auth padding during
ALTER_CONTEXT/AUTH3
dcerpc_util: don't allow auth_padding for BIND, ALTER_CONTEXT and AUTH3
pdus
s4:librpc: provide py_schannel bindings
RawDCERPCTest: split prepare_pdu() and send_pdu_blob() out of send_pdu()
RawDCERPCTest: add some more auth_length related asserts
dcesrv_core: add more verbose debugging for missing association groups
tests/dcerpc/raw_protocol: run test_neg_xmit_ffff_ffff over tcp and smb
dcesrv_core: introduce dcesrv_connection->transport_max_recv_frag
tests/dcerpc/raw_protocol: test_no_auth_ctx_request
tests/dcerpc/raw_protocol: fix comment in test_spnego_change_auth_type1
tests/dcerpc/raw_protocol: add tests for max auth_padding, auth_len or
auth_offset
tests/dcerpc/raw_protocol: add more tests for auth_pad alignment
tests/dcerpc/raw_protocol: test invalid schannel binds
dcerpc_util: let dcerpc_pull_auth_trailer() check that auth_offset is 4
bytes aligned
dcerpc_util: let dcerpc_pull_auth_trailer() expose the reject reason
dcerpc_util: let dcerpc_pull_auth_trailer() ignore data_and_pad for bind,
alter, auth3
dcesrv_core: a failure from gensec_update results in
NAK_REASON_INVALID_CHECKSUM
dcesrv_core: alter_context logon failures should result in
DCERPC_FAULT_ACCESS_DENIED
gensec:ntlmssp: only allow messages up to 2888 bytes
gensec:spnego: ignore trailing bytes in SPNEGO_SERVER_START state
dcesrv_core: fix the auth3 for large ntlmssp messages
dcesrv_core: better fault codes dcesrv_auth_prepare_auth3()
third_party/heimdal: Import lorikeet-heimdal-202410161454 (commit
0d61538a16b5051c820702f0711102112cd01a83)
s3:winbindd: call process_set_title() for locator child
s4:torture/rpc: check that DOWNGRADE_DETECTED has no bits negotiated
s4:torture/rpc: without weak crypto we should require AES
s3:rpc_server/netlogon: correctly negotiate flags in ServerAuthenticate2/3
s3:rpc_server/netlogon: if we require AES there's no need to remove the
ARCFOUR flag
s4:rpc_server/netlogon: if we require AES there's no need to remove the
ARCFOUR flag
netlogon.idl: the capabilities in query_level=2 are the ones send by the
client
libcli/auth: remove unused netlogon_creds_client_init_session_key()
libcli/auth: make use of netlogon_creds_cli_store_internal() in
netlogon_creds_cli_auth_srvauth_done()
libcli/auth: don't allow any unexpected upgrades of negotiate_flags
libcli/auth: if we require aes we don't need to require arcfour nor
strong key
libcli/auth: use a LogonControl after a LogonGetCapabilities downgrade
libcli/auth: use netr_LogonGetCapabilities query_level=2 to verify the
proposed capabilities
s4:librpc/rpc: do LogonControl after LogonGetCapabilities downgrade
s4:librpc/rpc: don't allow any unexpected upgrades of negotiate_flags
s4:librpc/rpc: define required schannel flags and enforce them
s4:librpc/rpc: use netr_LogonGetCapabilities query_level=2 to verify the
proposed capabilities
s4:torture/rpc/netlogon: adjust test_netlogon_capabilities query_level=2
to request_flags
s3:cli_netlogon: let rpccli_connect_netlogon() use force_reauth = true on
retry
s4:dsdb/common: samdb_confirm_rodc_allowed_to_repl_to() only needs a
const sid
s3:rpc_server/netlogon: add client_sid helper variables
s4:rpc_server/netlogon: add client_sid helper variables
libcli/auth: pass client_sid to netlogon_creds_server_init()
libcli/auth: split out netlogon_creds_CredentialState_extra_info
librpc/rpc: make use of creds->ex->client_sid in
dcesrv_netr_check_schannel_get_state()
s3:rpc_server/netlogon: make use of creds->ex->client_sid
s4:rpc_server/netlogon: make use of creds->ex->client_sid
libcli/auth: remove unused creds->sid
libcli/auth: remember client_requested_flags and auth_time in
netlogon_creds_server_init()
s3:rpc_server/netlogon: implement netr_LogonGetCapabilities query_level=2
s4:rpc_server/netlogon: implement netr_LogonGetCapabilities query_level=2
s4:torture/rpc: let test_netlogon_capabilities() fail on legacy servers
libcli/auth: also use netlogon_creds_CredentialState_extra_info for the
client
libcli/auth: let netlogon_creds_cli_store_internal() use
talloc_stackframe()
libcli/auth: let netlogon_creds_cli_store_internal check
netlogon_creds_CredentialState_legacy
libcli/auth: split out netlogon_creds_alloc()
s4:dsdb/common: dsdb_trust_get_incoming_passwords only needs a const
ldb_message
s4:rpc_server/netlogon: split out dcesrv_netr_ServerAuthenticateGeneric()
dcesrv_core: add DCESRV_NOT_USED_ON_WIRE() helper macro
s3:rpc_server: add DCESRV_COMPAT_NOT_USED_ON_WIRE() helper macro
netlogon.idl: add netr_ServerAuthenticateKerberos() and related stuff
libcli/auth: pass auth_{type,level} to
netlogon_creds_{de,en}crypt_samlogon_validation()
libcli/auth: pass auth_{type,level} to
netlogon_creds_{de,en}crypt_samlogon_logon()
libcli/auth: add netlogon_creds_{de,en}crypt_samr_Password()
libcli/auth: add netlogon_creds_{de,en}crypt_samr_CryptPassword()
libcli/auth: add netlogon_creds_{de,en}crypt_SendToSam()
pycredentials: make use of netlogon_creds_encrypt_samr_CryptPassword in
py_creds_encrypt_netr_crypt_password
pycredentials: add py_creds_encrypt_netr_PasswordInfo helper
python/tests: use encrypt_netr_PasswordInfo in
KDCBaseTest._test_samlogon()
libcli/auth: make netlogon_creds_des_{de,en}crypt_LMKey() static
libcli/auth: make use of netlogon_creds_encrypt_samr_CryptPassword
libcli/auth: make use of netlogon_creds_encrypt_SendToSam
libcli/auth: make use of netlogon_creds_{de,en}crypt_samr_Password
s4:torture/rpc: make use of netlogon_creds_encrypt_samlogon_logon()
s4:torture/rpc: make use of netlogon_creds_decrypt_samlogon_validation()
s4:torture/rpc: make use of netlogon_creds_encrypt_samr_CryptPassword()
s4:torture/rpc: make use of netlogon_creds_{de,en}crypt_samr_Password
s3:rpc_server/netlogon: make use of
netlogon_creds_{de,en}crypt_samr_Password
s3:rpc_server/netlogon: make use of
netlogon_creds_decrypt_samr_CryptPassword()
s4:rpc_server/netlogon: make use of
netlogon_creds_{de,en}crypt_samr_Password()
s4:rpc_server/netlogon: make use of
netlogon_creds_decrypt_samr_CryptPassword
s4:rpc_server/netlogon: make use of netlogon_creds_decrypt_SendToSam
libcli/auth: return INVALID_PARAMETER for DES in
netlogon_creds_{de,en}crypt_samlogon_logon
libcli/auth: pass auth_{type,level} to schannel_check_creds_state()
libcli/auth: pass auth_{type,level} to netlogon_creds_server_step_check()
libcli/auth: split out netlogon_creds_client_verify() that takes
auth_{type,level}
libcli/auth: make use of netlogon_creds_client_verify()
s4:librpc/rpc: make use of netlogon_creds_client_verify()
libcli/auth: let netlogon_creds_copy() copy all scalar elements
libcli/auth: split out netlogon_creds_cli_check_transport()
libcli/auth: make use of netlogon_creds_cli_check_transport() in more
places
-----------------------------------------------------------------------
--
Samba Shared Repository