home *** CD-ROM | disk | FTP | other *** search
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/docs/UNIX-SMB.txt samba-1.9.16alpha3/docs/UNIX-SMB.txt
- --- samba-1.9.16alpha2/docs/UNIX-SMB.txt Sat May 4 17:50:22 1996
- +++ samba-1.9.16alpha3/docs/UNIX-SMB.txt Wed May 29 17:54:11 1996
- @@ -155,6 +155,9 @@
- possible. This means that on those unixes the client is restricted to
- a single uid.
-
- +Note that you can also get the "trapdoor uid" message for other
- +reasons. Please see the FAQ for details.
- +
- Port numbers
- ============
-
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/docs/samba.faq samba-1.9.16alpha3/docs/samba.faq
- --- samba-1.9.16alpha2/docs/samba.faq Tue May 28 23:37:23 1996
- +++ samba-1.9.16alpha3/docs/samba.faq Wed May 29 17:54:12 1996
- @@ -402,6 +402,38 @@
-
- See also 'guest account' in smb.conf man page.
-
- +
- +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- +* 11: You get the message "you appear to have a trapdoor uid system"
- + in your logs
- +
- +This can have several causes. It might be because you are using a uid
- +or gid of 65535 or -1. This is a VERY bad idea, and is a big security
- +hole. Check carefully in your /etc/passwd file and make sure that no
- +user has uid 65535 or -1. Especially check the "nobody" user, as many
- +broken systems are shipped with nobody setup with a uid of 65535.
- +
- +It might also mean that your OS has a trapdoor uid/gid system :-)
- +
- +This means that once a process changes effective uid from root to
- +another user it can't go back to root. Unfortunately Samba relies on
- +being able to change effective uid from root to non-root and back
- +again to implement its security policy. If your OS has a trapdoor uid
- +system this won't work, and several things in Samba may break. Less
- +things will break if you use user or server level security instead of
- +the default share level security, but you may still strike
- +problems.
- +
- +The problems don't give rise to any security holes, so don't panic,
- +but it does mean some of Samba's capabilities will be unavailable.
- +In particular you will not be able to connect to the Samba server as
- +two different uids at once. This may happen if you try to print as a
- +"guest" while accessing a share as a normal user. It may also affect
- +your ability to list the available shares as this is normally done as
- +the guest user.
- +
- +Complain to your OS vendor and ask them to fix their system.
- +
- ===============================================================================
- SECTION FOUR: Specific client problems
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/cvs.log samba-1.9.16alpha3/source/cvs.log
- --- samba-1.9.16alpha2/source/cvs.log Wed May 29 14:35:23 1996
- +++ samba-1.9.16alpha3/source/cvs.log Wed May 29 17:54:54 1996
- @@ -676,3 +676,82 @@
- Log Message:
- preparing for release of 1.9.16alpha2
-
- +
- +****************************************
- +Date: Wednesday May 29, 1996 @ 14:35
- +Author: samba-bu
- +
- +Update of /data/cvs/samba/source
- +In directory arvidsjaur:/samba/samba-bugs/samba/source
- +
- +Added Files:
- + cvs.log
- +Log Message:
- +preparing for release of 1.9.16alpha2
- +
- +
- +****************************************
- +Date: Wednesday May 29, 1996 @ 17:45
- +Author: tridge
- +
- +Update of /data/cvs/samba/docs
- +In directory arvidsjaur:/var/tmp/cvs-serv20738
- +
- +Modified Files:
- + UNIX-SMB.txt samba.faq
- +Log Message:
- +added comments about trapdoor uids
- +
- +
- +
- +
- +****************************************
- +Date: Wednesday May 29, 1996 @ 17:47
- +Author: tridge
- +
- +Update of /data/cvs/samba/source
- +In directory arvidsjaur:/var/tmp/cvs-serv20784
- +
- +Modified Files:
- + password.c smbencrypt.c smbpass.c smbpasswd.c
- +Log Message:
- +cleanups to make thinsg compile cleanly
- +
- +
- +
- +
- +
- +****************************************
- +Date: Wednesday May 29, 1996 @ 17:49
- +Author: tridge
- +
- +Update of /data/cvs/samba/source
- +In directory arvidsjaur:/var/tmp/cvs-serv20901
- +
- +Modified Files:
- + trans2.c
- +Log Message:
- +fixed a typo
- +
- +
- +
- +
- +
- +
- +****************************************
- +Date: Wednesday May 29, 1996 @ 17:53
- +Author: tridge
- +
- +Update of /data/cvs/samba/source
- +In directory arvidsjaur:/var/tmp/cvs-serv21121
- +
- +Modified Files:
- + server.c util.c
- +Log Message:
- +handle errors from receive_smb better, and print error string
- +
- +
- +
- +
- +
- +
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/password.c samba-1.9.16alpha3/source/password.c
- --- samba-1.9.16alpha2/source/password.c Mon May 6 10:35:45 1996
- +++ samba-1.9.16alpha3/source/password.c Wed May 29 17:54:24 1996
- @@ -52,7 +52,7 @@
- v2 = (counter++) * getpid() + tval.tv_usec;
- SIVAL(challenge,0,v1);
- SIVAL(challenge,4,v2);
- - E1(challenge,"SAMBA",saved_challenge);
- + E1(challenge,"SAMBA",(char *)saved_challenge);
- memcpy(challenge,saved_challenge,8);
- challenge_sent = True;
- }
- @@ -684,7 +684,9 @@
- if(smb_pass->smb_nt_passwd != NULL)
- {
- DEBUG(4,("Checking NT MD4 password\n"));
- - if(smb_password_check(password, smb_pass->smb_nt_passwd, challenge))
- + if(smb_password_check(password,
- + smb_pass->smb_nt_passwd,
- + (char *)challenge))
- {
- update_protected_database(user,True);
- return(True);
- @@ -696,11 +698,12 @@
-
- /* Try against the lanman password */
-
- - if(smb_password_check(password, smb_pass->smb_passwd, challenge))
- - {
- - update_protected_database(user,True);
- - return(True);
- - }
- + if (smb_password_check(password,
- + smb_pass->smb_passwd,
- + (char *)challenge)) {
- + update_protected_database(user,True);
- + return(True);
- + }
-
- DEBUG(3,("Error smb_password_check failed\n"));
- }
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/server.c samba-1.9.16alpha3/source/server.c
- --- samba-1.9.16alpha2/source/server.c Mon May 6 10:35:46 1996
- +++ samba-1.9.16alpha3/source/server.c Wed May 29 17:54:25 1996
- @@ -2394,7 +2394,8 @@
-
- if (ChDir(pcon->connectpath) != 0)
- {
- - DEBUG(0,("Can't change directory to %s\n",pcon->connectpath));
- + DEBUG(0,("Can't change directory to %s (%s)\n",
- + pcon->connectpath,strerror(errno)));
- pcon->open = False;
- unbecome_user();
- if (!IS_IPC(cnum)) {
- @@ -3721,8 +3722,8 @@
- extern int keepalive;
-
- /* check for socket failure */
- - if (errno == EBADF) {
- - DEBUG(3,("%s Bad file descriptor - exiting\n",timestring()));
- + if (errno) {
- + DEBUG(3,("receive_smb error (%s) exiting\n",strerror(errno)));
- return;
- }
-
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/smbencrypt.c samba-1.9.16alpha3/source/smbencrypt.c
- --- samba-1.9.16alpha2/source/smbencrypt.c Sat May 4 17:50:25 1996
- +++ samba-1.9.16alpha3/source/smbencrypt.c Wed May 29 17:54:25 1996
- @@ -166,7 +166,7 @@
- MDstruct MD;
-
- /* Password cannot be longer than 128 characters */
- - len = strlen(passwd);
- + len = strlen((char *)passwd);
- if(len > 128)
- len = 128;
- /* Password must be converted to NT unicode */
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/smbpass.c samba-1.9.16alpha3/source/smbpass.c
- --- samba-1.9.16alpha2/source/smbpass.c Sat May 4 17:50:25 1996
- +++ samba-1.9.16alpha3/source/smbpass.c Wed May 29 17:54:25 1996
- @@ -262,7 +262,7 @@
- if (!strncasecmp((char *) p, "NO PASSWORD", 11)) {
- pw_buf.smb_passwd = NULL;
- } else {
- - if(!gethexpwd(p,smbpwd)) {
- + if(!gethexpwd((char *)p,(char *)smbpwd)) {
- DEBUG(0, ("Malformed Lanman password entry (non hex chars)\n"));
- fclose(fp);
- pw_file_unlock(lockfd);
- @@ -280,7 +280,7 @@
- the lanman password. */
- if ((linebuf_len >= (PTR_DIFF(p, linebuf) + 33)) && (p[32] == ':')) {
- if (*p != '*' && *p != 'X') {
- - if(gethexpwd(p,smbntpwd))
- + if(gethexpwd((char *)p,(char *)smbntpwd))
- pw_buf.smb_nt_passwd = smbntpwd;
- }
- }
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/smbpasswd.c samba-1.9.16alpha3/source/smbpasswd.c
- --- samba-1.9.16alpha2/source/smbpasswd.c Sat May 4 17:50:25 1996
- +++ samba-1.9.16alpha3/source/smbpasswd.c Wed May 29 17:54:25 1996
- @@ -152,8 +152,8 @@
- /* NT Entry was valid - even if 'X' or '*', can be overwritten */
- *got_valid_nt_entry = True;
- if (*p != '*' && *p != 'X') {
- - if(gethexpwd(p,smbntpwd))
- - pw_buf.smb_nt_passwd = smbntpwd;
- + if (gethexpwd((char *)p,(char *)smbntpwd))
- + pw_buf.smb_nt_passwd = smbntpwd;
- }
- }
- pw_buf.smb_name = user_name;
- @@ -167,12 +167,12 @@
- if (p[32] != ':')
- return (False);
-
- - if (!strncasecmp(p, "NO PASSWORD", 11)) {
- - pw_buf.smb_passwd = NULL; /* No password */
- + if (!strncasecmp((char *)p, "NO PASSWORD", 11)) {
- + pw_buf.smb_passwd = NULL; /* No password */
- } else {
- - if(!gethexpwd(p,smbpwd))
- - return False;
- - pw_buf.smb_passwd = smbpwd;
- + if(!gethexpwd((char *)p,(char *)smbpwd))
- + return False;
- + pw_buf.smb_passwd = smbpwd;
- }
-
- pw_buf.smb_name = user_name;
- @@ -189,8 +189,8 @@
- /* NT Entry was valid - even if 'X' or '*', can be overwritten */
- *got_valid_nt_entry = True;
- if (*p != '*' && *p != 'X') {
- - if(gethexpwd(p,smbntpwd))
- - pw_buf.smb_nt_passwd = smbntpwd;
- + if (gethexpwd((char *)p,(char *)smbntpwd))
- + pw_buf.smb_nt_passwd = smbntpwd;
- }
- }
- return &pw_buf;
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/trans2.c samba-1.9.16alpha3/source/trans2.c
- --- samba-1.9.16alpha2/source/trans2.c Mon May 6 10:35:46 1996
- +++ samba-1.9.16alpha3/source/trans2.c Wed May 29 17:54:26 1996
- @@ -1444,7 +1444,7 @@
- {
- int cnum;
- int outsize = 0;
- - int16 dptr_num=SSVAL(inbuf,smb_vwv0);
- + int16 dptr_num=SVALS(inbuf,smb_vwv0);
-
- cnum = SVAL(inbuf,smb_tid);
-
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/util.c samba-1.9.16alpha3/source/util.c
- --- samba-1.9.16alpha2/source/util.c Wed May 29 13:11:55 1996
- +++ samba-1.9.16alpha3/source/util.c Wed May 29 17:54:27 1996
- @@ -2683,12 +2683,11 @@
- if (len == -1)
- return(False);
-
- - if (len > BUFFER_SIZE)
- - {
- - DEBUG(0,("Invalid packet length! (%d bytes)\n",len));
- - if (len > BUFFER_SIZE + (SAFETY_MARGIN/2))
- - exit(1);
- - }
- + if (len > BUFFER_SIZE) {
- + DEBUG(0,("Invalid packet length! (%d bytes)\n",len));
- + if (len > BUFFER_SIZE + (SAFETY_MARGIN/2))
- + exit(1);
- + }
-
- ok = (read_data(fd,buffer+4,len) == len);
-
- diff -u -r --new-file --exclude=CVS samba-1.9.16alpha2/source/version.h samba-1.9.16alpha3/source/version.h
- --- samba-1.9.16alpha2/source/version.h Wed May 29 14:35:23 1996
- +++ samba-1.9.16alpha3/source/version.h Wed May 29 17:54:53 1996
- @@ -1 +1 @@
- -#define VERSION "1.9.16alpha2"
- +#define VERSION "1.9.16alpha3"
-