search for: sec_share

Displaying 5 results from an estimated 5 matches for "sec_share".

Did you mean: exec_share
2006 Aug 08
2
Applying security updates
...on: PANIC ERROR. Called as nonroot\n"); } + if (conn_num_open() > 2047) { + *status = NT_STATUS_INSUFF_SERVER_RESOURCES; + return NULL; + } + if(lp_security() != SEC_SHARE) { vuser = get_valid_user_struct(vuid); if (!vuser) { Does anyone know how to apply the update? Many thanks Steve
2002 Jun 03
1
What is so bad about primaryGroupID=513?
...file performs a "switch message SMBsesssetupX (pid 7865)", the C0000078 logins have a "switch message SMBtrans" in this position. This is slightly puzzling. Yours, Florian Hars. PS: isn't there a return(True) missing in uid.c/change_to_user: if((lp_security() == SEC_SHARE) && (current_user.conn == conn) && (current_user.uid == conn->uid)) { DEBUG(4,("change_to_user: Skipping user change - already user\n")); return(True); } else if ((current_user.conn == conn) &&...
2000 Jan 27
0
service_ok, redux.
...do domain logons to. > */ > if (Globals.bDomainLogons == True) > { > if (Globals.bEncryptPasswords == False) > DEBUG(0,( "WARNING: encrypt passwords must be true if " > "domain logons is true.\n")); > > if (Globals.security == SEC_SHARE) > DEBUG(0,( "WARNING: security should be domain if " > "domain logons is true.\n")); > else if (Globals.security == SEC_USER > || Globals.security == SEC_SERVER) > DEBUG(0,( "NOTICE: security = user or security == server will only "...
2000 Jan 27
1
Proposed improvements to service_ok()
...do domain logons to. > */ > if (Globals.bDomainLogons == True) > { > if (Globals.bEncryptPasswords == False) > DEBUG(0,( "WARNING: encrypt passwords must be true if " > "domain logons is true.\n")); > > if (Globals.security == SEC_SHARE) > DEBUG(0,( "WARNING: security should be domain if " > "domain logons is true.\n")); > else if (Globals.security == SEC_USER > || Globals.security == SEC_SERVER) > DEBUG(0,( "NOTICE: security = user or server will only " >...
2000 May 22
1
Inherit Permissions addition
...} + + /* * We need a separate check in security=share mode due to vuid * always being UID_FIELD_INVALID. If we don't do this then * in share mode security we are *always* changing uid's between @@ -177,12 +216,12 @@ */ if((lp_security() == SEC_SHARE) && (current_user.conn == conn) && - (current_user.uid == conn->uid)) { + (current_user.uid == conn->uid) && (!inheritnewgid)) { DEBUG(4,("Skipping become_user - already user\n")); return(True); } else...