Skip to content

Commit d0d0cd3

Browse files
committed
Merge tag '6.10-rc7-smb3-client-fix' of git://git.samba.org/sfrench/cifs-2.6
Pull smb client fix from Steve French: "Small fix, also for stable" * tag '6.10-rc7-smb3-client-fix' of git://git.samba.org/sfrench/cifs-2.6: cifs: fix setting SecurityFlags to true
2 parents 528dd46 + d2346e2 commit d0d0cd3

File tree

2 files changed

+13
-27
lines changed

2 files changed

+13
-27
lines changed

Documentation/admin-guide/cifs/usage.rst

Lines changed: 11 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -723,40 +723,26 @@ Configuration pseudo-files:
723723
======================= =======================================================
724724
SecurityFlags Flags which control security negotiation and
725725
also packet signing. Authentication (may/must)
726-
flags (e.g. for NTLM and/or NTLMv2) may be combined with
726+
flags (e.g. for NTLMv2) may be combined with
727727
the signing flags. Specifying two different password
728728
hashing mechanisms (as "must use") on the other hand
729729
does not make much sense. Default flags are::
730730

731-
0x07007
732-
733-
(NTLM, NTLMv2 and packet signing allowed). The maximum
734-
allowable flags if you want to allow mounts to servers
735-
using weaker password hashes is 0x37037 (lanman,
736-
plaintext, ntlm, ntlmv2, signing allowed). Some
737-
SecurityFlags require the corresponding menuconfig
738-
options to be enabled. Enabling plaintext
739-
authentication currently requires also enabling
740-
lanman authentication in the security flags
741-
because the cifs module only supports sending
742-
laintext passwords using the older lanman dialect
743-
form of the session setup SMB. (e.g. for authentication
744-
using plain text passwords, set the SecurityFlags
745-
to 0x30030)::
731+
0x00C5
732+
733+
(NTLMv2 and packet signing allowed). Some SecurityFlags
734+
may require enabling a corresponding menuconfig option.
746735

747736
may use packet signing 0x00001
748737
must use packet signing 0x01001
749-
may use NTLM (most common password hash) 0x00002
750-
must use NTLM 0x02002
751738
may use NTLMv2 0x00004
752739
must use NTLMv2 0x04004
753-
may use Kerberos security 0x00008
754-
must use Kerberos 0x08008
755-
may use lanman (weak) password hash 0x00010
756-
must use lanman password hash 0x10010
757-
may use plaintext passwords 0x00020
758-
must use plaintext passwords 0x20020
759-
(reserved for future packet encryption) 0x00040
740+
may use Kerberos security (krb5) 0x00008
741+
must use Kerberos 0x08008
742+
may use NTLMSSP 0x00080
743+
must use NTLMSSP 0x80080
744+
seal (packet encryption) 0x00040
745+
must seal (not implemented yet) 0x40040
760746

761747
cifsFYI If set to non-zero value, additional debug information
762748
will be logged to the system error log. This field

fs/smb/client/cifsglob.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1918,8 +1918,8 @@ require use of the stronger protocol */
19181918
#define CIFSSEC_MUST_SEAL 0x40040 /* not supported yet */
19191919
#define CIFSSEC_MUST_NTLMSSP 0x80080 /* raw ntlmssp with ntlmv2 */
19201920

1921-
#define CIFSSEC_DEF (CIFSSEC_MAY_SIGN | CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_NTLMSSP)
1922-
#define CIFSSEC_MAX (CIFSSEC_MUST_NTLMV2)
1921+
#define CIFSSEC_DEF (CIFSSEC_MAY_SIGN | CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_NTLMSSP | CIFSSEC_MAY_SEAL)
1922+
#define CIFSSEC_MAX (CIFSSEC_MAY_SIGN | CIFSSEC_MUST_KRB5 | CIFSSEC_MAY_SEAL)
19231923
#define CIFSSEC_AUTH_MASK (CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_KRB5 | CIFSSEC_MAY_NTLMSSP)
19241924
/*
19251925
*****************************************************************

0 commit comments

Comments
 (0)