Print this page
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-4064 NULL session setup gets internal error
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-3080 SMB1 signing problem with Kerberos auth.
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-1404 fixed malformed entries in zone_sun.tab
NEX-1799 Failure to authenticate domain account from Win2003 with NTLM(v1)
SMB-149 mount.cifs RedHat\Centos 6 doesn't work with default security options
SMB-126 Unable to map share from win2003/win2003R2 client ...
SMB-107 Unable to map network drive in workgroup mode using Windows XP...
SMB-68 NTLM(v1) inbound with Extended Session Security
SMB-123 misleading log messages from smb_logon
SMB-56 extended security NTLMSSP, inbound

*** 8,18 **** * source. A copy of the CDDL is also available via the Internet at * http://www.illumos.org/license/CDDL. */ /* ! * Copyright 2015 Nexenta Systems, Inc. All rights reserved. */ /* * SPNEGO back-end for NTLMSSP. See [MS-NLMP] */ --- 8,18 ---- * source. A copy of the CDDL is also available via the Internet at * http://www.illumos.org/license/CDDL. */ /* ! * Copyright 2017 Nexenta Systems, Inc. All rights reserved. */ /* * SPNEGO back-end for NTLMSSP. See [MS-NLMP] */
*** 487,497 **** * This (indirectly) calls smb_auth_validate() to * check that the client gave us a valid hash. */ token = smbd_user_auth_logon(&user_info); if (token == NULL) { ! status = NT_STATUS_ACCESS_DENIED; goto errout; } if (token->tkn_ssnkey.val != NULL && token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) { --- 487,499 ---- * This (indirectly) calls smb_auth_validate() to * check that the client gave us a valid hash. */ token = smbd_user_auth_logon(&user_info); if (token == NULL) { ! status = user_info.lg_status; ! if (status == 0) /* should not happen */ ! status = NT_STATUS_INTERNAL_ERROR; goto errout; } if (token->tkn_ssnkey.val != NULL && token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) {