Print this page
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-15558 SMB logon fails during 1st second after service start
Reviewed by: Matt Barden <matt.barden@nexenta.com>
Reviewed by: Evan Layton <evan.layton@nexenta.com>
NEX-4064 NULL session setup gets internal error
Reviewed by: Gordon Ross <gordon.ross@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-3080 SMB1 signing problem with Kerberos auth.
Reviewed by: Bayard Bell <bayard.bell@nexenta.com>
Reviewed by: Dan Fields <dan.fields@nexenta.com>
Reviewed by: Kevin Crowe <kevin.crowe@nexenta.com>
Reviewed by: Matt Barden <Matt.Barden@nexenta.com>
NEX-1404 fixed malformed entries in zone_sun.tab
NEX-1799 Failure to authenticate domain account from Win2003 with NTLM(v1)
SMB-149 mount.cifs RedHat\Centos 6 doesn't work with default security options
SMB-126 Unable to map share from win2003/win2003R2 client ...
SMB-107 Unable to map network drive in workgroup mode using Windows XP...
SMB-68 NTLM(v1) inbound with Extended Session Security
SMB-123 misleading log messages from smb_logon
SMB-56 extended security NTLMSSP, inbound
        
@@ -8,11 +8,11 @@
  * source.  A copy of the CDDL is also available via the Internet at
  * http://www.illumos.org/license/CDDL.
  */
 
 /*
- * Copyright 2015 Nexenta Systems, Inc.  All rights reserved.
+ * Copyright 2017 Nexenta Systems, Inc.  All rights reserved.
  */
 
 /*
  * SPNEGO back-end for NTLMSSP.  See [MS-NLMP]
  */
@@ -487,11 +487,13 @@
          * This (indirectly) calls smb_auth_validate() to
          * check that the client gave us a valid hash.
          */
         token = smbd_user_auth_logon(&user_info);
         if (token == NULL) {
-                status = NT_STATUS_ACCESS_DENIED;
+                status = user_info.lg_status;
+                if (status == 0) /* should not happen */
+                        status = NT_STATUS_INTERNAL_ERROR;
                 goto errout;
         }
 
         if (token->tkn_ssnkey.val != NULL &&
             token->tkn_ssnkey.len == SMBAUTH_HASH_SZ) {