svn commit: samba r2764 - in branches/SAMBA_4_0/source/build/pidl: .
Author: tpot Date: 2004-10-01 05:28:20 + (Fri, 01 Oct 2004) New Revision: 2764 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/build/pidl&rev=2764&nolog=1 Log: Use hand-written function for all occurrences of IDL strings, not just those with a single pointer. Modified: branches/SAMBA_4_0/source/build/pidl/swig.pm Changeset: Modified: branches/SAMBA_4_0/source/build/pidl/swig.pm === --- branches/SAMBA_4_0/source/build/pidl/swig.pm2004-10-01 05:19:51 UTC (rev 2763) +++ branches/SAMBA_4_0/source/build/pidl/swig.pm2004-10-01 05:28:20 UTC (rev 2764) @@ -91,7 +91,7 @@ # Special cases -if ($e->{TYPE} eq "string" && $e->{POINTERS} == 1) { +if ($e->{TYPE} eq "string") { $result .= "\ts->$prefix$e->{NAME} = string_ptr_from_python(mem_ctx, $obj, \"$e->{NAME}\");\n"; return $result; } @@ -187,7 +187,7 @@ # Special cases -if ($e->{TYPE} eq "string" && $e->{POINTERS} == 1) { +if ($e->{TYPE} eq "string") { $result .= "\tPyDict_SetItemString(obj, \"$e->{NAME}\", string_ptr_to_python(mem_ctx, s->$prefix$e->{NAME}));\n"; return $result; }
svn commit: lorikeet r82 - in trunk/samba4-ad-thesis: .
Author: abartlet Date: 2004-10-01 05:23:53 + (Fri, 01 Oct 2004) New Revision: 82 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=lorikeet&path=/trunk/samba4-ad-thesis&rev=82&nolog=1 Log: Add yet more information on NTLMSSP Modified: trunk/samba4-ad-thesis/chapters.lyx Changeset: Modified: trunk/samba4-ad-thesis/chapters.lyx === --- trunk/samba4-ad-thesis/chapters.lyx 2004-09-27 23:14:25 UTC (rev 81) +++ trunk/samba4-ad-thesis/chapters.lyx 2004-10-01 05:23:53 UTC (rev 82) @@ -858,9 +858,12 @@ this third party, preferably by some cryptographic proof. Often this is by yet another shared-secret authentication scheme. +\layout Chapter + +NTLM \layout Section -NTLM +NTLM Challenge Response \layout Standard The NTLM authentication scheme is a challenge-response authentication scheme, @@ -1053,17 +1056,25 @@ \layout Subsubsection* LM session key construction +\layout Standard + +The LM session key is constructed from the first 8 bytes of the LM hash, + padded to 16 bytes with zeros. + Given what we understand about the LM hash, it is equivilant to the password + for passwords of 7 characters or less! +\layout LyX-Code + +LM_key = concat(head(ascii(password), 8), zeros[8]); \layout Subsubsection* NT session key construction \layout Standard -The NT session key is a fixed derivative of the password - it contains none - of the per-session information that the otherwise weaker LM key does: +The NT session key is also fixed derivative of the password: \layout LyX-Code NT_key = md4(md4(unicode(password)); -\layout Subsection +\layout Section NLTMSSP \layout Standard @@ -1085,7 +1096,7 @@ to understand them. At each end of the connection, these blobs of data are passed down to the security libraries for processing. -\layout Subsubsection* +\layout Subsection NTLMSSP Packets \layout Standard @@ -1114,7 +1125,7 @@ \layout Standard The format of these packets, and the meaning of most of the options carried - in them is now reasonably well understood, and partially documented in + in them is now reasonably well understood, and partially documented by \begin_inset LatexCommand \citet{opengroupntlm} @@ -1122,8 +1133,91 @@ . +\layout Subsection + +NTLMSSP Options +\layout Standard + +Within the NTLMSSP context, a different set of session keys, cyphers and + authentication inputs are used - depending on the negotiated options. + The fact that these are negotiated is promlementic, but the implementation + may define minimum required options. + What follows is a discussion of some of the options - but a more complete + treatment (of some of the options) is given by +\begin_inset LatexCommand \citet{davenportntlm} + +\end_inset + +. \layout Subsubsection* +LM Session Key +\layout Standard + +The LM session key is created as specified by +\begin_inset LatexCommand \citet{opengroupntlm} + +\end_inset + + - it is based on the NTLM `LM Key', and includes part of the LM response + (and therefore the server-generated random challenge) in a DES based hash, + making it unique for each session. + It is negotiated by the specification of the +\family typewriter +NTLMSSP_NEGOTIATE_LM_KEY +\family default + in the negotiated options. +\layout Standard + +This key is then 'weakened' to various strengths, to fix export requirements. + The irony is that the 128 bit negotiated key is far from this real strength, + due to there being at most 56 bits of key input! +\layout Subsubsection* + +NT Sesssion Key (v1) +\layout Standard + +When the LM_KEY option is not negotiated, and no other options are specified, + the session key is the NT Key from the NTLM level. + This is stronger in hash strength, with real 128 bit stength, but again, + the key is fixed until the user's password changes. + Unfortunetly other factors - the use the LM response function for the authentic +ation step - means that the key can be discovered by breaking a 56 bit cypher. +\layout Subsubsection* + +NTLM2 Session Response +\layout Standard + +Another modification to the NTLMSSP login scheme, this option prevents a + server-initiated dictionary attack, by providing input from the client + and server in calculating the challenge input to the challenge-response + function. + This option also modifies the session key negotiation, to include mutually + agreed random data into the key. + This ensures that the session key again changes between sessions. +\layout Subsubsection* + +Key Exchange +\layout Standard + +In another modification to the session key negotiation, the specfication + of the +\family typewriter +NTLMSSP_NEGOTIATE_KEY_EXCHANGE +\family default + flag allows the client to specify a new session key, to be encrypted with + what otherwise would be the session key. + Presumably, the client would choose a random sequence of bytes, unrelated + to the password, but as will be noted in +\begin_inset LatexCommand \ref{
svn commit: samba r2763 - in branches/SAMBA_4_0/source/librpc/rpc: .
Author: tridge Date: 2004-10-01 05:19:51 + (Fri, 01 Oct 2004) New Revision: 2763 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/librpc/rpc&rev=2763&nolog=1 Log: use no-auth bind on ncacn_np unless we specify at least one of "sign", "seal" or "connect" Modified: branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c Changeset: Modified: branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c === --- branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c 2004-10-01 03:28:39 UTC (rev 2762) +++ branches/SAMBA_4_0/source/librpc/rpc/dcerpc_util.c 2004-10-01 05:19:51 UTC (rev 2763) @@ -496,7 +496,8 @@ if (username && username[0] && (binding->flags & DCERPC_SCHANNEL_ANY)) { status = dcerpc_bind_auth_schannel(*p, pipe_uuid, pipe_version, domain, username, password); - } else if (username && username[0]) { + } else if (username && username[0] && + (binding->flags & (DCERPC_CONNECT|DCERPC_SIGN|DCERPC_SEAL))) { status = dcerpc_bind_auth_ntlm(*p, pipe_uuid, pipe_version, domain, username, password); } else { status = dcerpc_bind_auth_none(*p, pipe_uuid, pipe_version);
svn commit: samba r2762 - in branches/SAMBA_3_0/source: nsswitch utils
Author: abartlet Date: 2004-10-01 03:28:39 + (Fri, 01 Oct 2004) New Revision: 2762 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_3_0/source&rev=2762&nolog=1 Log: Remove silly conversion to and from UTF8 on the winbind pipe. Fix the naming of the require_membership_of parameter in pam_winbind and fix the error code for 'you didn't specify a domain' in ntlm_auth. Andrew Bartlett Modified: branches/SAMBA_3_0/source/nsswitch/pam_winbind.c branches/SAMBA_3_0/source/nsswitch/wbinfo.c branches/SAMBA_3_0/source/nsswitch/winbindd_nss.h branches/SAMBA_3_0/source/nsswitch/winbindd_pam.c branches/SAMBA_3_0/source/utils/ntlm_auth.c Changeset: Sorry, the patch is too large (368 lines) to include; please use WebSVN to see it! WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_3_0/source&rev=2762&nolog=1
svn commit: samba r2761 - in branches/SAMBA_3_0/source/rpc_server: .
Author: abartlet Date: 2004-10-01 03:14:57 + (Fri, 01 Oct 2004) New Revision: 2761 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_3_0/source/rpc_server&rev=2761&nolog=1 Log: Print the decrypted, not encrypted key. Andrew Bartlett Modified: branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c Changeset: Modified: branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c === --- branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c2004-10-01 02:59:43 UTC (rev 2760) +++ branches/SAMBA_3_0/source/rpc_server/srv_netlog_nt.c2004-10-01 03:14:57 UTC (rev 2761) @@ -486,8 +486,8 @@ cred_hash3( pwd, q_u->pwd, p->dc.sess_key, 0); DEBUG(100,("Server password set : new given value was :\n")); - for(i = 0; i < 16; i++) - DEBUG(100,("%02X ", q_u->pwd[i])); + for(i = 0; i < sizeof(pwd); i++) + DEBUG(100,("%02X ", pwd[i])); DEBUG(100,("\n")); old_pw = pdb_get_nt_passwd(sampass);
svn commit: samba r2760 - branches/SAMBA_3_0/source/nsswitch trunk/source/nsswitch
Author: tpot Date: 2004-10-01 02:59:43 + (Fri, 01 Oct 2004) New Revision: 2760 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/&rev=2760&nolog=1 Log: Another patch from The Written Word. Don't declare function prototypes inside a function. Bugzilla #1762. Modified: branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c trunk/source/nsswitch/winbind_nss_aix.c Changeset: Modified: branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c === --- branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-10-01 02:57:10 UTC (rev 2759) +++ branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-10-01 02:59:43 UTC (rev 2760) @@ -159,12 +159,13 @@ return id; } +static struct passwd *wb_aix_getpwuid(uid_t uid); + static char *decode_user(const char *name) { struct passwd *pwd; unsigned id; char *ret; - static struct passwd *wb_aix_getpwuid(uid_t uid); sscanf(name+1, "%u", &id); pwd = wb_aix_getpwuid(id); Modified: trunk/source/nsswitch/winbind_nss_aix.c === --- trunk/source/nsswitch/winbind_nss_aix.c 2004-10-01 02:57:10 UTC (rev 2759) +++ trunk/source/nsswitch/winbind_nss_aix.c 2004-10-01 02:59:43 UTC (rev 2760) @@ -159,12 +159,13 @@ return id; } +static struct passwd *wb_aix_getpwuid(uid_t uid); + static char *decode_user(const char *name) { struct passwd *pwd; unsigned id; char *ret; - static struct passwd *wb_aix_getpwuid(uid_t uid); sscanf(name+1, "%u", &id); pwd = wb_aix_getpwuid(id);
svn commit: samba r2759 - branches/SAMBA_3_0/source branches/SAMBA_3_0/source/nsswitch trunk/source trunk/source/nsswitch
Author: tpot Date: 2004-10-01 02:57:10 + (Fri, 01 Oct 2004) New Revision: 2759 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/&rev=2759&nolog=1 Log: Fix for winbindd on AIX 5.1. Apparently it doesn't have as many methods in struct secmethod_table as AIX 5.2. Patch from The Written Word. Modified: branches/SAMBA_3_0/source/configure.in branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c trunk/source/configure.in trunk/source/nsswitch/winbind_nss_aix.c Changeset: Modified: branches/SAMBA_3_0/source/configure.in === --- branches/SAMBA_3_0/source/configure.in 2004-09-30 16:08:09 UTC (rev 2758) +++ branches/SAMBA_3_0/source/configure.in 2004-10-01 02:57:10 UTC (rev 2759) @@ -4291,6 +4291,14 @@ AC_DEFINE(HAVE_PASSWD_PW_AGE, 1, [Defined if struct passwd has pw_age field]),, [#include ]) +# AIX 4.3.x and 5.1 do not have as many members in +# struct secmethod_table as AIX 5.2 +AC_CHECK_MEMBERS([struct secmethod_table.method_attrlist], , , + [#include ]) +AC_CHECK_MEMBERS([struct secmethod_table.method_version], , , + [#include ]) + + # # Check to see if we should use the included popt Modified: branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c === --- branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-09-30 16:08:09 UTC (rev 2758) +++ branches/SAMBA_3_0/source/nsswitch/winbind_nss_aix.c2004-10-01 02:57:10 UTC (rev 2759) @@ -741,6 +741,7 @@ return; } +#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST /* return a list of additional attributes supported by the backend */ @@ -764,6 +765,7 @@ return ret; } +#endif /* @@ -977,7 +979,9 @@ { ZERO_STRUCTP(methods); +#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_VERSION methods->method_version = SECMETHOD_VERSION_520; +#endif methods->method_getgrgid = wb_aix_getgrgid; methods->method_getgrnam = wb_aix_getgrnam; @@ -997,7 +1001,9 @@ methods->method_passwdrestrictions = wb_aix_passwdrestrictions; methods->method_getgracct = wb_aix_getgracct; methods->method_getgrusers = wb_aix_getgrusers; +#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST methods->method_attrlist = wb_aix_attrlist; +#endif #if LOG_UNIMPLEMENTED_CALLS methods->method_delgroup = method_delgroup; Modified: trunk/source/configure.in === --- trunk/source/configure.in 2004-09-30 16:08:09 UTC (rev 2758) +++ trunk/source/configure.in 2004-10-01 02:57:10 UTC (rev 2759) @@ -4297,6 +4297,14 @@ AC_DEFINE(HAVE_PASSWD_PW_AGE, 1, [Defined if struct passwd has pw_age field]),, [#include ]) +# AIX 4.3.x and 5.1 do not have as many members in +# struct secmethod_table as AIX 5.2 +AC_CHECK_MEMBERS([struct secmethod_table.method_attrlist], , , + [#include ]) +AC_CHECK_MEMBERS([struct secmethod_table.method_version], , , + [#include ]) + + # # Check to see if we should use the included popt Modified: trunk/source/nsswitch/winbind_nss_aix.c === --- trunk/source/nsswitch/winbind_nss_aix.c 2004-09-30 16:08:09 UTC (rev 2758) +++ trunk/source/nsswitch/winbind_nss_aix.c 2004-10-01 02:57:10 UTC (rev 2759) @@ -741,6 +741,7 @@ return; } +#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST /* return a list of additional attributes supported by the backend */ @@ -764,6 +765,7 @@ return ret; } +#endif /* @@ -977,7 +979,9 @@ { ZERO_STRUCTP(methods); +#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_VERSION methods->method_version = SECMETHOD_VERSION_520; +#endif methods->method_getgrgid = wb_aix_getgrgid; methods->method_getgrnam = wb_aix_getgrnam; @@ -997,7 +1001,9 @@ methods->method_passwdrestrictions = wb_aix_passwdrestrictions; methods->method_getgracct = wb_aix_getgracct; methods->method_getgrusers = wb_aix_getgrusers; +#ifdef HAVE_STRUCT_SECMETHOD_TABLE_METHOD_ATTRLIST methods->method_attrlist = wb_aix_attrlist; +#endif #if LOG_UNIMPLEMENTED_CALLS methods->method_delgroup = method_delgroup;
svn commit: samba-web r365 - in trunk/history: .
Author: deryck Date: 2004-09-30 21:19:31 + (Thu, 30 Sep 2004) New Revision: 365 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk/history&rev=365&nolog=1 Log: Add today's security release to security page. --deryck Modified: trunk/history/security.html Changeset: Modified: trunk/history/security.html === --- trunk/history/security.html 2004-09-30 14:46:26 UTC (rev 364) +++ trunk/history/security.html 2004-09-30 21:19:31 UTC (rev 365) @@ -21,6 +21,16 @@ Complete Release Notes + +30 September 2004 +Samba 2.2.12 and/or patch for <=Samba 3.0.5 +Potential arbitrary file access +Samba 2.2.x <=2.2.11 and Samba 3.0.x <=3.0.5 +http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815";>CAN-2004-0815 +Release Notes + + + 13 Sept 2004 3.0.5 patch
svn commit: samba r2758 - in branches/SAMBA_4_0/source/ldap_server: . devdocs
Author: idra Date: 2004-09-30 16:08:09 + (Thu, 30 Sep 2004) New Revision: 2758 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/ldap_server&rev=2758&nolog=1 Log: keep docos handy while developing it Added: branches/SAMBA_4_0/source/ldap_server/devdocs/ branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2252.txt branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2253.txt branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2254.txt branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2255.txt branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2256.txt branches/SAMBA_4_0/source/ldap_server/devdocs/rfc2307.txt Changeset: Sorry, the patch is too large (5709 lines) to include; please use WebSVN to see it! WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/ldap_server&rev=2758&nolog=1
svn commit: samba-web r364 - in trunk: . history
Author: deryck Date: 2004-09-30 14:46:26 + (Thu, 30 Sep 2004) New Revision: 364 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=364&nolog=1 Log: Update 2.2.12 info in history and stable release sections. --deryck Modified: trunk/header2.html trunk/history/header_history.html Changeset: Modified: trunk/header2.html === --- trunk/header2.html 2004-09-30 13:43:33 UTC (rev 363) +++ trunk/header2.html 2004-09-30 14:46:26 UTC (rev 364) @@ -141,10 +141,10 @@ -Samba 2.2.11 +Samba 2.2.12 (gzipped) -Release Notes -Signature +Release Notes +Signature Release History Modified: trunk/history/header_history.html === --- trunk/history/header_history.html 2004-09-30 13:43:33 UTC (rev 363) +++ trunk/history/header_history.html 2004-09-30 14:46:26 UTC (rev 364) @@ -93,6 +93,8 @@ samba-3.0.2.html samba-3.0.1.html samba-3.0.0.html +samba-2.2.12.html +samba-2.2.11.html samba-2.2.10.html samba-2.2.9.html samba-2.2.8a.html
svn commit: samba-web r363 - in trunk: . news/releases
Author: deryck Date: 2004-09-30 13:43:33 + (Thu, 30 Sep 2004) New Revision: 363 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=363&nolog=1 Log: Add security announcement to news, and fix html and typos on the main samba.org page. --deryck Added: trunk/news/releases/security_2.2.12.html Modified: trunk/index.html Changeset: Modified: trunk/index.html === --- trunk/index.html2004-09-30 13:08:21 UTC (rev 362) +++ trunk/index.html2004-09-30 13:43:33 UTC (rev 363) @@ -12,15 +12,15 @@ 30 September 2004 Security Notice -- CVE CAN-2004-0815 -A security vulnerability has been located in Samba 2.2.x <= 2.2.11 - and Samba 3.0.x <= 3.0.5. A remote attacker may be able to gain access - to files which exist outside of the share's defined path. Such files - must still be readable by the account used for the connection. +A security vulnerability has been located in Samba 2.2.x <= 2.2.11 +and Samba 3.0.x <= 3.0.5. A remote attacker may be able to gain +access to files which exist outside of the share's defined path. Such +files must still be readable by the account used for the connection. Samba 2.2.12 (signature) has been released to address this issue in the 2.2.x release series. A patch - for Samba 3.0.5 and earlieri (signature) + for Samba 3.0.5 and earlier (signature) is available as well. Added: trunk/news/releases/security_2.2.12.html === --- trunk/news/releases/security_2.2.12.html2004-09-30 13:08:21 UTC (rev 362) +++ trunk/news/releases/security_2.2.12.html2004-09-30 13:43:33 UTC (rev 363) @@ -0,0 +1,13 @@ +Security Notice -- CVE CAN-2004-0815 + + +A security vulnerability has been located in Samba 2.2.x <= 2.2.11 and Samba 3.0.x <= 3.0.5. A remote attacker may be able to gain access to files which exist outside of the share's defined path. Such files must still be readable by the account used for the connection. + +Samba 2.2.12 (signature) + has been released to address this issue in the 2.2.x release series. A + patch + for Samba 3.0.5 and earlier (signature) + is available as well. + + + Property changes on: trunk/news/releases/security_2.2.12.html ___ Name: svn:executable + *
svn commit: samba r2757 - in branches/SAMBA_4_0/source/ldap_server: .
Author: metze Date: 2004-09-30 13:29:27 + (Thu, 30 Sep 2004) New Revision: 2757 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba&path=/branches/SAMBA_4_0/source/ldap_server&rev=2757&nolog=1 Log: some minor fixes metze Modified: branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c Changeset: Modified: branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c === --- branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c 2004-09-30 01:04:58 UTC (rev 2756) +++ branches/SAMBA_4_0/source/ldap_server/ldap_simple_ldb.c 2004-09-30 13:29:27 UTC (rev 2757) @@ -40,7 +40,7 @@ */ static char *sldb_fix_dn(const char *dn) { - char *new_dn, *n, *current; + char *new_dn; int i, j, k; /* alloc enough room to host the whole dn as multibyte string */ @@ -333,8 +333,6 @@ ldb_set_alloc(ldb, talloc_ldb_alloc, samdb); ldb_ret = ldb_delete(ldb, dn); - errstr = ldb_errstring(ldb); - del_reply = ldapsrv_init_reply(call, LDAP_TAG_DelResponse); ALLOC_CHECK(del_reply);
svn commit: samba-web r362 - in trunk: .
Author: jerry Date: 2004-09-30 13:08:21 + (Thu, 30 Sep 2004) New Revision: 362 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=362&nolog=1 Log: fixing typo Modified: trunk/index.html Changeset: Modified: trunk/index.html === --- trunk/index.html2004-09-30 13:04:52 UTC (rev 361) +++ trunk/index.html2004-09-30 13:08:21 UTC (rev 362) @@ -38,7 +38,7 @@ no guarantees. But the 3.1 tree will also has some new experimental features that may entice you to take a look (we hope). -(...more release notes. +(...more release notes). The Samba 3.1.0 source code can be downloaded now. The GnuPG
svn commit: samba-web r361 - in trunk: . history
Author: jerry Date: 2004-09-30 13:04:52 + (Thu, 30 Sep 2004) New Revision: 361 WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=361&nolog=1 Log: release announcements Added: trunk/history/samba-2.2.12.html Modified: trunk/index.html Changeset: Sorry, the patch is too large (490 lines) to include; please use WebSVN to see it! WebSVN: http://websvn.samba.org/websvn/changeset.php?rep=samba-web&path=/trunk&rev=361&nolog=1