Print this page
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-4064 NULL session setup gets internal error
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-3080 SMB1 signing problem with Kerberos auth.
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-1404 fixed malformed entries in zone_sun.tab
NEX-1799 Failure to authenticate domain account from Win2003 with NTLM(v1)
SMB-149 mount.cifs RedHat\Centos 6 doesn't work with default security options
SMB-126 Unable to map share from win2003/win2003R2 client ...
SMB-107 Unable to map network drive in workgroup mode using Windows XP...
SMB-68 NTLM(v1) inbound with Extended Session Security
SMB-123 misleading log messages from smb_logon
SMB-56 extended security NTLMSSP, inbound
        
*** 8,18 ****
   * source.  A copy of the CDDL is also available via the Internet at
   * http://www.illumos.org/license/CDDL.
   */
  
  /*
!  * Copyright 2015 Nexenta Systems, Inc.  All rights reserved.
   */
  
  /*
   * SPNEGO back-end for NTLMSSP.  See [MS-NLMP]
   */
--- 8,18 ----
   * source.  A copy of the CDDL is also available via the Internet at
   * http://www.illumos.org/license/CDDL.
   */
  
  /*
!  * Copyright 2017 Nexenta Systems, Inc.  All rights reserved.
   */
  
  /*
   * SPNEGO back-end for NTLMSSP.  See [MS-NLMP]
   */
*** 487,497 ****
           * This (indirectly) calls smb_auth_validate() to
           * check that the client gave us a valid hash.
           */
          token = smbd_user_auth_logon(&user_info);
          if (token == NULL) {
!                 status = NT_STATUS_ACCESS_DENIED;
                  goto errout;
          }
  
          if (token->tkn_ssnkey.val != NULL &&
              token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) {
--- 487,499 ----
           * This (indirectly) calls smb_auth_validate() to
           * check that the client gave us a valid hash.
           */
          token = smbd_user_auth_logon(&user_info);
          if (token == NULL) {
!                 status = user_info.lg_status;
!                 if (status == 0) /* should not happen */
!                         status = NT_STATUS_INTERNAL_ERROR;
                  goto errout;
          }
  
          if (token->tkn_ssnkey.val != NULL &&
              token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) {