The Samba-Bugzilla – Attachment 4601 Details for
Bug 6664
netr_SetPassword server and client need to cope with long session keys
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
patch for 3.4
v3-4-test-netr_passwordset.diff (text/plain), 1.64 KB, created by
Guenther Deschner
on 2009-08-27 11:58:26 UTC
(
hide
)
Description:
patch for 3.4
Filename:
MIME Type:
Creator:
Guenther Deschner
Created:
2009-08-27 11:58:26 UTC
Size:
1.64 KB
patch
obsolete
>From eae30788c4b82498a1e298fb6bcb472a52650cb4 Mon Sep 17 00:00:00 2001 >From: Stefan Metzmacher <metze@samba.org> >Date: Thu, 27 Aug 2009 13:16:15 +0200 >Subject: [PATCH] s3:netlogon: replace cred_hash3 by des_crypt112_16 > >This makes sure we don't truncate the session key to 8 bytes > >metze >--- > source3/rpc_client/cli_netlogon.c | 6 +++--- > source3/rpc_server/srv_netlog_nt.c | 3 +-- > 2 files changed, 4 insertions(+), 5 deletions(-) > >diff --git a/source3/rpc_client/cli_netlogon.c b/source3/rpc_client/cli_netlogon.c >index 5f115e5..4d7347f 100644 >--- a/source3/rpc_client/cli_netlogon.c >+++ b/source3/rpc_client/cli_netlogon.c >@@ -601,9 +601,9 @@ NTSTATUS rpccli_netlogon_set_trust_password(struct rpc_pipe_client *cli, > > struct samr_Password new_password; > >- cred_hash3(new_password.hash, >- new_trust_passwd_hash, >- cli->dc->sess_key, 1); >+ des_crypt112_16(new_password.hash, >+ new_trust_passwd_hash, >+ cli->dc->sess_key, 1); > > result = rpccli_netr_ServerPasswordSet(cli, mem_ctx, > cli->dc->remote_machine, >diff --git a/source3/rpc_server/srv_netlog_nt.c b/source3/rpc_server/srv_netlog_nt.c >index 79606ab..3337c87 100644 >--- a/source3/rpc_server/srv_netlog_nt.c >+++ b/source3/rpc_server/srv_netlog_nt.c >@@ -741,8 +741,7 @@ NTSTATUS _netr_ServerPasswordSet(pipes_struct *p, > return NT_STATUS_ACCOUNT_DISABLED; > } > >- /* Woah - what does this to to the credential chain ? JRA */ >- cred_hash3(pwd, r->in.new_password->hash, p->dc->sess_key, 0); >+ des_crypt112_16(pwd, r->in.new_password->hash, p->dc->sess_key, 0); > > DEBUG(100,("_netr_ServerPasswordSet: new given value was :\n")); > for(i = 0; i < sizeof(pwd); i++) >-- >1.6.2.5 >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 6664
:
4600
| 4601 |
4602