s3-netlogon: Fix NETLOGON credential chain. Fixes Bug #6099 (Windows 7 joining Samba3...
authorGuenther Deschner <gd@samba.org>
Thu, 7 May 2009 19:52:10 +0000 (12:52 -0700)
committerKarolin Seeger <kseeger@samba.org>
Tue, 19 May 2009 08:23:20 +0000 (10:23 +0200)
Jeremy, with 9a5d5cc1db0ee60486f932e34cd7961b90c70a56 you alter the in negotiate
flags (which are a pointer to the out negotiate flags assigned in the generated
netlogon server code). So, while you wanted to just set the *out* negflags, you
did in fact reset the *in* negflags, effectively eliminating the
NETLOGON_NEG_STRONG_KEYS bit (formerly known as NETLOGON_NEG_128BIT) which then
caused creds_server_init() to generate 64bit creds instead of 128bit, causing
the whole chain to break. *Please* check.

Guenther

source/rpc_server/srv_netlog_nt.c

index 0d6d80d6462a7369c8ce0e6b6b918221c7e0b84a..427aeda3483bdbc2fc14522f1fd6c23e1b28b849 100644 (file)
@@ -498,14 +498,13 @@ NTSTATUS _netr_ServerAuthenticate2(pipes_struct *p,
                srv_flgs |= NETLOGON_NEG_SCHANNEL;
        }
 
-       *r->out.negotiate_flags = srv_flgs;
-
        /* We use this as the key to store the creds: */
        /* r->in.computer_name */
 
        if (!p->dc || !p->dc->challenge_sent) {
                DEBUG(0,("_netr_ServerAuthenticate2: no challenge sent to client %s\n",
                        r->in.computer_name));
+               *r->out.negotiate_flags = srv_flgs;
                return NT_STATUS_ACCESS_DENIED;
        }
 
@@ -516,6 +515,7 @@ NTSTATUS _netr_ServerAuthenticate2(pipes_struct *p,
                DEBUG(0,("_netr_ServerAuthenticate2: schannel required but client failed "
                        "to offer it. Client was %s\n",
                        r->in.account_name));
+               *r->out.negotiate_flags = srv_flgs;
                return NT_STATUS_ACCESS_DENIED;
        }
 
@@ -527,6 +527,7 @@ NTSTATUS _netr_ServerAuthenticate2(pipes_struct *p,
                        "account %s: %s\n",
                        r->in.account_name, nt_errstr(status) ));
                /* always return NT_STATUS_ACCESS_DENIED */
+               *r->out.negotiate_flags = srv_flgs;
                return NT_STATUS_ACCESS_DENIED;
        }
 
@@ -544,6 +545,7 @@ NTSTATUS _netr_ServerAuthenticate2(pipes_struct *p,
                        "request from client %s machine account %s\n",
                        r->in.computer_name,
                        r->in.account_name));
+               *r->out.negotiate_flags = srv_flgs;
                return NT_STATUS_ACCESS_DENIED;
        }
        /* set up the LSA AUTH 2 response */
@@ -563,6 +565,8 @@ NTSTATUS _netr_ServerAuthenticate2(pipes_struct *p,
                                            p->dc);
        unbecome_root();
 
+       *r->out.negotiate_flags = srv_flgs;
+
        return NT_STATUS_OK;
 }