On Sat, Aug 23, 2008 at 02:49:25AM -0600, Tukaram Laxmeshwar wrote: > We code changes to fix this issue and verified that it is not dumping any > more. > Following is the patch , > --- nsswitch/winbindd_cm.c.old 2008-05-15 13:22:13.000000000 +0530 > +++ nsswitch/winbindd_cm.c 2008-05-15 13:21:55.000000000 +0530 > @@ -1691,6 +1691,10 @@ > return; > } > > + if (sid_equal(&domain->sid, &global_sid_Builtin)) { > + domain->active_directory = False; > + goto done; > + } > result = rpccli_lsa_open_policy2(cli, mem_ctx, True, > SEC_RIGHTS_MAXIMUM_ALLOWED, &pol); > > Can anybody tell me if this has been fixed in any of the recent patches ?
No, very likely that is not changed. Your patch might fix it, but to me it seems the wrong place to fix. For S-1-5-32 we should *never* end up in that routine. How does winbind get there? For internal domains we should never connect to the network. Volker
pgpVCSVR6NvT8.pgp
Description: PGP signature
-- To unsubscribe from this list go to the following URL and read the instructions: https://lists.samba.org/mailman/listinfo/samba