s3-winbindd Only use SamLogonEx when we can get unencrypted session keys
authorAndrew Bartlett <abartlet@samba.org>
Wed, 14 Dec 2011 22:57:56 +0000 (09:57 +1100)
committerKarolin Seeger <kseeger@samba.org>
Sat, 30 Jun 2012 12:02:47 +0000 (14:02 +0200)
This ensures that we have some check on the session keys being returned
as the RC4 cipher is not checksumed.

The check comes from the fact that the credentials chain is tied to
the netlgon session key, and so if the credentials check passes then
the netlogon session key will be correct, and so the user session key
will be correctly decrypted.

Andrew Bartlett

Signed-off-by: Matthieu Patou <mat@matws.net>
s3: If we can't do validation 6 or sam_logon_ex use sam_logon only
(cherry picked from commit c119cd8868fc7e2eb08b09f7092519007fd83bf6)

source3/winbindd/winbindd_pam.c

index a8afa00909555e6a417f9b6c88e2deab72049442..c8910d6a437c6e30b723e0cd4ada44526b3855a6 100644 (file)
@@ -1365,7 +1365,7 @@ static NTSTATUS winbindd_dual_pam_auth_samlogon(struct winbindd_domain *domain,
                        domain->can_do_validation6 = false;
                }
 
-               logon_fn = contact_domain->can_do_samlogon_ex
+               logon_fn = (contact_domain->can_do_samlogon_ex && domain->can_do_validation6)
                        ? rpccli_netlogon_sam_network_logon_ex
                        : rpccli_netlogon_sam_network_logon;
 
@@ -1991,7 +1991,7 @@ enum winbindd_result winbindd_dual_pam_auth_crap(struct winbindd_domain *domain,
                        domain->can_do_validation6 = false;
                }
 
-               logon_fn = contact_domain->can_do_samlogon_ex
+               logon_fn = (contact_domain->can_do_samlogon_ex && domain->can_do_validation6)
                        ? rpccli_netlogon_sam_network_logon_ex
                        : rpccli_netlogon_sam_network_logon;