Print this page
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-4064 NULL session setup gets internal error
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-3080 SMB1 signing problem with Kerberos auth.
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-1404 fixed malformed entries in zone_sun.tab
NEX-1799 Failure to authenticate domain account from Win2003 with NTLM(v1)
SMB-149 mount.cifs RedHat\Centos 6 doesn't work with default security options
SMB-126 Unable to map share from win2003/win2003R2 client ...
SMB-107 Unable to map network drive in workgroup mode using Windows XP...
SMB-68 NTLM(v1) inbound with Extended Session Security
SMB-123 misleading log messages from smb_logon
SMB-56 extended security NTLMSSP, inbound
*** 8,18 ****
* source. A copy of the CDDL is also available via the Internet at
* http://www.illumos.org/license/CDDL.
*/
/*
! * Copyright 2015 Nexenta Systems, Inc. All rights reserved.
*/
/*
* SPNEGO back-end for NTLMSSP. See [MS-NLMP]
*/
--- 8,18 ----
* source. A copy of the CDDL is also available via the Internet at
* http://www.illumos.org/license/CDDL.
*/
/*
! * Copyright 2017 Nexenta Systems, Inc. All rights reserved.
*/
/*
* SPNEGO back-end for NTLMSSP. See [MS-NLMP]
*/
*** 487,497 ****
* This (indirectly) calls smb_auth_validate() to
* check that the client gave us a valid hash.
*/
token = smbd_user_auth_logon(&user_info);
if (token == NULL) {
! status = NT_STATUS_ACCESS_DENIED;
goto errout;
}
if (token->tkn_ssnkey.val != NULL &&
token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) {
--- 487,499 ----
* This (indirectly) calls smb_auth_validate() to
* check that the client gave us a valid hash.
*/
token = smbd_user_auth_logon(&user_info);
if (token == NULL) {
! status = user_info.lg_status;
! if (status == 0) /* should not happen */
! status = NT_STATUS_INTERNAL_ERROR;
goto errout;
}
if (token->tkn_ssnkey.val != NULL &&
token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) {