Skip to content

Commit 0ae90bd

Browse files
committed
bullet formatting
1 parent 1f8fd03 commit 0ae90bd

File tree

1 file changed

+55
-54
lines changed

1 file changed

+55
-54
lines changed

articles/azure-netapp-files/kerberos.md

Lines changed: 55 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ The following table displays the amount of time a cache entry lives in an Azure
8787
| Idle name server connections | 60 seconds |
8888
| LDAP query timeout | 10 seconds |
8989
| Local DNS host entry for KDC TTL | 24 hours |
90-
| Kerberos ticket age | Specified by KDC* and/or client <br></br> *[Defaults to 10 hours](/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket#default-values) for Windows Active Directory KDCs |
90+
| Kerberos ticket age | Specified by KDC* and/or client <br></br> *[Defaults to 10 hours](/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-lifetime-for-user-ticket#default-values) for Windows Active Directory KDCs |
9191
| User credentials | 24 hours |
9292
| Kerberos time skew | 5 minutes |
9393

@@ -115,7 +115,7 @@ Key considerations for time sync issues:
115115
- [Time skew errors can be seen in the event viewer](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4768) on the KDC with the error KRB_AP_ERR_SKEW, as well as in packet captures.
116116
- [Replay attack attempts get logged](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4649) in the event viewer with KRB_AP_ERR_REPEAT.
117117

118-
For more information, see [Maximum tolerance for computer clock synchronization](/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization)
118+
For more information, see [Maximum tolerance for computer clock synchronization](/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/maximum-tolerance-for-computer-clock-synchronization)
119119

120120
### Domain Name Systems (DNS)
121121

@@ -126,7 +126,7 @@ In Windows SMB environments, a backup authentication method may be tried (such a
126126
In addition to SPN resolution, DNS is heavily utilized to resolve hostnames and IP addresses for domain services, such as LDAP, Kerberos KDCs, etc. via SRV records. For more detailed information on DNS in Azure NetApp Files (including what SRV records are required), see [About DNS in Azure NetApp Files](domain-name-system-concept.md).
127127

128128
>[!NOTE]
129-
>If an IP address is used for Kerberos access, the behavior depends on the NAS protocol (NFS or SMB) in use. See [IP addresses for access with Kerberos](LINK) for more information.
129+
>If an IP address is used for Kerberos access, the behavior depends on the NAS protocol (NFS or SMB) in use. For more information, see [IP addresses for access with Kerberos](#ip-addresses-for-access-with-kerberos).
130130
131131
### Lightweight directory access protocol
132132

@@ -281,65 +281,66 @@ When an Azure NetApp Files volume is mounting using Kerberos, a Kerberos ticket
281281
<summary>For steps detailing how SMB share is accessed in Azure NetApp Files, expand the list.</summary>
282282
- The client attempts to access an SMB share using the UNC path shown in Azure NetApp Files. By default, the UNC path would include the SMB server name (such as ANF-XXXX)
283283
- DNS is queried to map the hostname to an IP address
284-
- An initial SMB2 “Negotiate Protocol” conversation takes place
285-
o A request is sent from the client to discover which SMB dialects are supported by the server and includes what the requesting client supports
286-
o The server responds with what it supports, including:
287-
 Security mode (signing or not)
288-
 SMB version
289-
 Server GUID
290-
 Capabilities supported (DFS, leasing, large MTU, multichannel, persistent handles, directory leasing, encryption)
291-
 Max transaction size
292-
 Max read/write size
293-
 Security blob (Kerberos or NTLM)
294-
- A 2nd SMB2 “Negotiate Protocol” conversation takes place as “pre-authorization”/login
295-
o Request from client includes:
296-
 Preauthorization hash
297-
 Supported security modes (signing or not)
298-
 Capabilities supported (DFS, leasing, large MTU, multichannel, persistent handles, directory leasing, encryption)
299-
 Client GUID
300-
 Supported SMB dialects
301-
o If the preauthorization hash is accepted, the server responds with:
302-
 Security mode (signing or not)
303-
 Capabilities supported (DFS, leasing, large MTU, multichannel, persistent handles, directory leasing, encryption)
304-
 Max transaction size
305-
 Max read/write size
306-
 Security blob (Kerberos or NTLM)
307-
 SMB preauth integrity and encryption capabilities
308-
- If the protocol negotiation succeeds, a “Session setup” request is made
309-
o Setup uses the preauth hash from the protocol negotiation
310-
o Setup informs the SMB server what the requesting client supports, including:
311-
 StructureSize
312-
 Session binding flag
313-
 Security mode (Signing enabled/required)
314-
 Capabilities
315-
 Supported Kerberos encryption types
316-
- A “Session setup” response is sent
317-
o SMB credits are granted
318-
o Session ID is established
319-
o Session flags are set (guest, null, encrypt)
320-
o Kerberos encryption type is defined
284+
- An initial SMB2 "Negotiate Protocol" conversation takes place
285+
- A request is sent from the client to discover which SMB dialects are supported by the server and includes what the requesting client supports
286+
- The server responds with what it supports, including:
287+
* Security mode (signing or not)
288+
* SMB version
289+
* Server GUID
290+
* Capabilities supported (DFS, leasing, large MTU, multichannel, persistent handles, directory leasing, encryption)
291+
* Max transaction size
292+
* Max read/write size
293+
* Security blob (Kerberos or NTLM)
294+
- A second SMB2 "Negotiate Protocol" conversation takes place as "pre-authorization"/login
295+
- Request from client includes:
296+
* Preauthorization hash
297+
* Supported security modes (signing or not)
298+
* Capabilities supported (DFS, leasing, large MTU, multichannel, persistent handles, directory leasing, encryption)
299+
* Client GUID
300+
* Supported SMB dialects
301+
- If the preauthorization hash is accepted, the server responds with:
302+
* Security mode (signing or not)
303+
* Capabilities supported (DFS, leasing, large MTU, multichannel, persistent handles, directory leasing, encryption)
304+
* Max transaction size
305+
* Max read/write size
306+
* Security blob (Kerberos or NTLM)
307+
* SMB preauth integrity and encryption capabilities
308+
- If the protocol negotiation succeeds, a "Session setup" request is made
309+
- Setup uses the preauth hash from the protocol negotiation
310+
- Setup informs the SMB server what the requesting client supports, including:
311+
* StructureSize
312+
* Session binding flag
313+
* Security mode (Signing enabled/required)
314+
* Capabilities
315+
* Supported Kerberos encryption types
316+
- A "Session setup" response is sent
317+
318+
* SMB credits are granted
319+
- Session ID is established
320+
- Session flags are set (guest, null, encrypt)
321+
- Kerberos encryption type is defined
321322
- A tree connect request is sent by the client for connection to the SMB share
322-
o Share flags/capabilities are sent from server, along with share permissions
323+
- Share flags/capabilities are sent from server, along with share permissions
323324
- The ioctl command FSCTL_QUERY_NETWORK_INTERFACE_INFO is sent to get the IP address of the SMB server
324-
o The SMB server in Azure NetApp Files reports back with the network information, including:
325-
IP address
326-
Interface capability (RSS on or off)
327-
RSS queue count
328-
Link speed
329-
- A tree connect request is sent by the client for connection to the IPC$ administrative share
330-
o The ipc$ share is a resource that shares the named pipes that are essential for communication between programs. The ipc$ share is used during remote administration of a computer and when viewing a computer's shared resources. You cannot change the share settings, share properties, or ACLs of the ipc$ share. You also cannot rename or delete the ipc$ share.
331-
o A file named srvsvc is created in the share as a service handle
325+
- The SMB server in Azure NetApp Files reports back with the network information, including:
326+
* IP address
327+
* Interface capability (RSS on or off)
328+
* RSS queue count
329+
* Link speed
330+
- A tree connect request is sent by the client for connection to the IPC$ administrative share
331+
* The ipc$ share is a resource that shares the named pipes that are essential for communication between programs. The ipc$ share is used during remote administration of a computer and when viewing a computer's shared resources. You cannot change the share settings, share properties, or ACLs of the ipc$ share. You also cannot rename or delete the ipc$ share.
332+
- A file named srvsvc is created in the share as a service handle
332333
- A DCERPC bind is done to the srvsvc file to establish a secure connection
333-
o The file is written to with the previously retrieved information
334+
- The file is written to with the previously retrieved information
334335
- A Kerberos TGS-REQ is issued by the Windows client to the KDC to get a service ticket (ST) for the SMB service
335336
- NetShareGetInfo command is run by the SMB client to the server and a response is sent
336337
- The SMB service ticket is retrieved from the KDC
337338
- Azure NetApp Files attempts to map the Windows user requesting access to the share to a valid UNIX user
338-
o A Kerberos TGS request is made using the SMB server Kerberos credentials stored with the SMB server’s keytab from initial SMB server creation to use for an LDAP server bind
339-
o LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user “pcuser” is used by Azure NetApp Files for name mapping (files/folders written in dual protocol volumes will use the mapped UNIX user as the UNIX owner)
339+
- A Kerberos TGS request is made using the SMB server Kerberos credentials stored with the SMB server’s keytab from initial SMB server creation to use for an LDAP server bind
340+
- LDAP is searched for a UNIX user that is mapped to the SMB user requesting share access. If no UNIX user exists in LDAP, then the default UNIX user “pcuser” is used by Azure NetApp Files for name mapping (files/folders written in dual protocol volumes will use the mapped UNIX user as the UNIX owner)
340341
- Another negotiate protocol/session request/tree connect is performed, this time using the SMB server’s Kerberos SPN to the Active Directory DC’s IPC$ share
341-
o A named pipe is established to the share via the srvsvc
342-
o A netlogon session is established to the share and the Windows user is authenticated
342+
- A named pipe is established to the share via the srvsvc
343+
- A netlogon session is established to the share and the Windows user is authenticated
343344
- If permissions allow it for the user, the share lists the files and folders contained in the volume
344345

345346
>[!NOTE]

0 commit comments

Comments
 (0)