E.g. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY.
The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY.
</para>
-
- <para>Note the default will very likely change to <constant>no</constant> for Samba 4.5.</para>
</description>
-<value type="default">yes</value>
-<value type="example">no</value>
+<value type="default">no</value>
+<value type="example">yes</value>
</samba:parameter>
lpcfg_do_global_parameter(lp_ctx, "RawNTLMv2Auth", "False");
lpcfg_do_global_parameter(lp_ctx, "client use spnego principal", "False");
- lpcfg_do_global_parameter(lp_ctx, "allow dcerpc auth level connect", "True");
+ lpcfg_do_global_parameter(lp_ctx, "allow dcerpc auth level connect", "False");
lpcfg_do_global_parameter(lp_ctx, "UnixExtensions", "True");
Globals.client_ntlmv2_auth = true; /* Client should always use use NTLMv2, as we can't tell that the server supports it, but most modern servers do */
/* Note, that we will also use NTLM2 session security (which is different), if it is available */
- Globals.allow_dcerpc_auth_level_connect = true; /* we need to allow this for now by default */
+ Globals.allow_dcerpc_auth_level_connect = false; /* we don't allow this by default */
Globals.map_to_guest = 0; /* By Default, "Never" */
Globals.oplock_break_wait_time = 0; /* By Default, 0 msecs. */