I've seen error messages about this since we installed 1.9.18p10 of samba,
so I went looking in the code for the context.
Here (from password.c) is the context:
/*
* Attempt a session setup with a totally incorrect password.
* If this succeeds with the guest bit *NOT* set then the password
* server is broken and is not correctly setting the guest bit. We
* need to detect this as some versions of NT4.x are broken. JRA.
*/
if (cli_session_setup(&cli, user, (char *)badpass, sizeof(badpass),
(char *)badpass, sizeof(badpass), domain)) {
if ((SVAL(cli.inbuf,smb_vwv2) & 1) == 0) {
DEBUG(0,("server_validate: password server %s allows users as
non-guest \
with a bad password.\n", cli.desthost));
DEBUG(0,("server_validate: This is broken (and insecure)
behaviour. Please do not \
use this machine as the password server.\n"));
cli_ulogoff(&cli);
return False;
}
cli_ulogoff(&cli);
}
WHAT versions of NT4 have this problem? Obviously, we have one!
Jim
--
Jim Watt jimw@PE-Nelson.COM
Perkin-Elmer Corporation Voice (desk): +1 408 577 2228
PE-Nelson Division Fax: +1 408 894 9307
3833 North First Street Voice (main): +1 408 577 2200
San Jose CA 95134-1701
Christopher Kranz
1998-Sep-02 16:15 UTC
samba error message - "broken (and insecure) behavior"
Well this explains a problem we have been seeing for some time now. We have it configured so that 5 bad password attempts within 15 minutes causes the account to become locked out. Unfortunately we have lab accounts that are used by more than person at a time at the same time. This results in the lab accounts becoming locked out because a known bad password is always sent first. Can this be changed? Is there a way to test the password server only once and not for each and every login attempt? I think this is a useful feature but checking the same password server over and over again seems a little bit much. Perhaps a separate utility to check your password server is needed. Or perhaps this code should only be run once at initial start up? Christopher Kranz clk@cs.princeton.edu -- Jim Watt wrote:> > I've seen error messages about this since we installed 1.9.18p10 of samba, > so I went looking in the code for the context. > > Here (from password.c) is the context: > > /* > * Attempt a session setup with a totally incorrect password. > * If this succeeds with the guest bit *NOT* set then the password > * server is broken and is not correctly setting the guest bit. We > * need to detect this as some versions of NT4.x are broken. JRA. > */ > > if (cli_session_setup(&cli, user, (char *)badpass, sizeof(badpass), > (char *)badpass, sizeof(badpass), domain)) { > if ((SVAL(cli.inbuf,smb_vwv2) & 1) == 0) { > DEBUG(0,("server_validate: password server %s allows users as non-guest \ > with a bad password.\n", cli.desthost)); > DEBUG(0,("server_validate: This is broken (and insecure) behaviour. Please do not \ > use this machine as the password server.\n")); > cli_ulogoff(&cli); > return False; > } > cli_ulogoff(&cli); > } > > WHAT versions of NT4 have this problem? Obviously, we have one! > > Jim