From: Stefan Metzmacher Date: Fri, 6 Dec 2013 10:04:44 +0000 (+0100) Subject: HACK NT4 style DC X-Git-Url: http://git.samba.org/?p=metze%2Fsamba%2Fwip.git;a=commitdiff_plain;h=de193a98c20a4bd2ee71646e415573e4297a538f HACK NT4 style DC --- diff --git a/libcli/auth/netlogon_creds_cli.c b/libcli/auth/netlogon_creds_cli.c index 72f33bd60143..8aff15033146 100644 --- a/libcli/auth/netlogon_creds_cli.c +++ b/libcli/auth/netlogon_creds_cli.c @@ -303,6 +303,7 @@ NTSTATUS netlogon_creds_cli_context_global(struct loadparm_context *lp_ctx, "require strong key", server_netbios_domain, require_strong_key); + require_strong_key = false; /* * allow overwrite per domain diff --git a/source3/rpc_server/netlogon/srv_netlog_nt.c b/source3/rpc_server/netlogon/srv_netlog_nt.c index 83e68417c767..2a2476e9d513 100644 --- a/source3/rpc_server/netlogon/srv_netlog_nt.c +++ b/source3/rpc_server/netlogon/srv_netlog_nt.c @@ -919,11 +919,11 @@ NTSTATUS _netr_ServerAuthenticate3(struct pipes_struct *p, /* Ensure we support strong (128-bit) keys. */ if (in_neg_flags & NETLOGON_NEG_STRONG_KEYS) { - srv_flgs |= NETLOGON_NEG_STRONG_KEYS; + //srv_flgs |= NETLOGON_NEG_STRONG_KEYS; } if (in_neg_flags & NETLOGON_NEG_SUPPORTS_AES) { - srv_flgs |= NETLOGON_NEG_SUPPORTS_AES; + //srv_flgs |= NETLOGON_NEG_SUPPORTS_AES; } if (lp_server_schannel() != false) { @@ -2174,6 +2174,9 @@ NTSTATUS _netr_LogonGetCapabilities(struct pipes_struct *p, struct netlogon_creds_CredentialState *creds; NTSTATUS status; + //p->fault_state = DCERPC_FAULT_OP_RNG_ERROR; + return NT_STATUS_NOT_IMPLEMENTED; + become_root(); status = netr_creds_server_step_check(p, p->mem_ctx, r->in.computer_name,