DEBUG(3, ("exchange_emsmdb: EcDoConnect (0x0)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
+ if (!dcesrv_call_authenticated(dce_call) && 1 == 0) {
DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
failure:
wire_handle.handle_type = EXCHANGE_HANDLE_EMSMDB;
DEBUG(3, ("exchange_emsmdb: EcDoDisconnect (0x1)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- return MAPI_E_LOGON_FAILED;
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// return MAPI_E_LOGON_FAILED;
+// }
/* Step 1. Retrieve handle and free if emsmdbp context and session are available */
h = dcesrv_handle_fetch(dce_call->context, r->in.handle, DCESRV_HANDLE_ANY);
DEBUG(3, ("exchange_emsmdb: EcDoRpc (0x2)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- return MAPI_E_LOGON_FAILED;
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// return MAPI_E_LOGON_FAILED;
+// }
/* Retrieve the emsmdbp_context from the session management system */
session = dcesrv_find_emsmdb_session(&r->in.handle->uuid);
DEBUG(5, ("exchange_nsp: NspiBind (0x0)\n"));
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
+ if (!dcesrv_call_authenticated(dce_call) && (r->in.dwFlags & fAnonymousLogin)) {
DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
wire_handle.handle_type = EXCHANGE_HANDLE_NSP;
}
/* Step 2. Check if incoming user belongs to the Exchange organization */
- if (emsabp_verify_user(dce_call, emsabp_ctx) == false) {
+ if ((emsabp_verify_user(dce_call, emsabp_ctx) == false) && (r->in.dwFlags & fAnonymousLogin)) {
talloc_free(emsabp_ctx);
wire_handle.handle_type = EXCHANGE_HANDLE_NSP;
DEBUG(5, ("exchange_nsp: NspiUnbind (0x1)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
+// }
/* Step 1. Retrieve handle and free if emsabp context and session are available */
h = dcesrv_handle_fetch(dce_call->context, r->in.handle, DCESRV_HANDLE_ANY);
DEBUG(3, ("exchange_nsp: NspiQueryRows (0x3)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
+// }
emsabp_ctx = dcesrv_find_emsabp_context(&r->in.handle->uuid);
if (!emsabp_ctx) {
DEBUG(3, ("exchange_nsp: NspiGetMatches (0x5)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
+// }
emsabp_ctx = dcesrv_find_emsabp_context(&r->in.handle->uuid);
if (!emsabp_ctx) {
DEBUG(3, ("exchange_nsp: NspiDNToMId (0x7)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
+// }
emsabp_ctx = dcesrv_find_emsabp_context(&r->in.handle->uuid);
if (!emsabp_ctx) {
DEBUG(3, ("exchange_nsp: NspiGetProps (0x9)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
+// }
emsabp_ctx = dcesrv_find_emsabp_context(&r->in.handle->uuid);
if (!emsabp_ctx) {
DEBUG(3, ("exchange_nsp: NspiGetSpecialTable (0xC)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
- DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+// DCESRV_NSP_RETURN(r, MAPI_E_LOGON_FAILED, NULL);
+// }
emsabp_ctx = dcesrv_find_emsabp_context(&r->in.handle->uuid);
if (!emsabp_ctx) {
DEBUG(5, ("exchange_ds_rfr: RfrGetNewDSA (0x0)\n"));
+ /* HACK: Disable authentication */
/* Step 0. Ensure incoming user is authenticated */
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
-
- r->out.ppszUnused = NULL;
- r->out.ppszServer = NULL;
- r->out.result = MAPI_E_LOGON_FAILED;
- return MAPI_E_LOGON_FAILED;
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+//
+// r->out.ppszUnused = NULL;
+// r->out.ppszServer = NULL;
+// r->out.result = MAPI_E_LOGON_FAILED;
+// return MAPI_E_LOGON_FAILED;
+// }
/* Step 1. We don't have load-balancing support yet, just return Samba FQDN name */
netbiosname = lpcfg_netbios_name(dce_call->conn->dce_ctx->lp_ctx);
DEBUG(3, ("exchange_ds_rfr: RfrGetFQDNFromLegacyDN (0x1)\n"));
- if (!dcesrv_call_authenticated(dce_call)) {
- DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
-
- failure:
- r->out.ppszServerFQDN = talloc_array(mem_ctx, const char *, 2);
- r->out.ppszServerFQDN[0] = NULL;
- r->out.result = MAPI_E_LOGON_FAILED;
- return MAPI_E_LOGON_FAILED;
- }
-
- netbiosname = lpcfg_netbios_name(dce_call->conn->dce_ctx->lp_ctx);
- realm = lpcfg_realm(dce_call->conn->dce_ctx->lp_ctx);
- if (!netbiosname || !realm) {
- goto failure;
- }
+// if (!dcesrv_call_authenticated(dce_call)) {
+// DEBUG(1, ("No challenge requested by client, cannot authenticate\n"));
+
+// failure:
+// r->out.ppszServerFQDN = talloc_array(mem_ctx, const char *, 2);
+// r->out.ppszServerFQDN[0] = NULL;
+// r->out.result = MAPI_E_LOGON_FAILED;
+// return MAPI_E_LOGON_FAILED;
+// }
+
+// netbiosname = lpcfg_netbios_name(dce_call->conn->dce_ctx->lp_ctx);
+// realm = lpcfg_realm(dce_call->conn->dce_ctx->lp_ctx);
+// if (!netbiosname || !realm) {
+// goto failure;
+// }
fqdn = talloc_asprintf(mem_ctx, "%s.%s", netbiosname, realm);
r->out.ppszServerFQDN = talloc_array(mem_ctx, const char *, 2);