From: Dan Lenski on
On Sun, 18 Apr 2010 10:29:38 -0400, simo wrote:

> On Sun, 2010-04-18 at 10:05 -0400, Nico Kadel-Garcia wrote:
>>
>> Reviewing the docs, this tool requires Samba 3.2 or later on both the
>> client and server sides. I'm therefore assuming that it's not
>> compatible with a contemporary Windows fileserver: can you confirm
>> this? Does anyone know if NetApp supports such encryption?
>
> It is an extension created by the Samba Team as part of unix extensions,
> and at the moment the only client that implements it is smbclient. Not
> even the in kernel cifs driver implements it. And we have no knowledge
> of any other implementer adopting it yet.

Does anyone know a time-frame for inclusion of transport encryption in
the kernel CIFS driver? I'm really looking forward to this feature!

Dan


--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Jeremy Allison on
On Fri, Jun 25, 2010 at 06:44:17PM +0000, Dan Lenski wrote:
> On Tue, 01 Dec 2009 08:23:01 -0800, Jeremy Allison wrote:
>
> > On Tue, Dec 01, 2009 at 10:01:57AM -0600, Cameron Laird wrote:
> >> What are the prospects for "smb transport encryption"? Where can I
> >> learn more?
> >
> > It's implemented via the UNIX extension mechanism between smbclient and
> > smbd for versions of Samba 3.2.x and greater.
> >
> > Not yet implemented in the Linux CIFSFS client or MacOSX client.
>
> The encryption feature of smbclient seems really great! But it is too
> bad that it is only in smbclient and not in smbmount/mount.cifs.
>
> Is there any technical barrier to implementing it in smbmount?

No technical barrier, just the willingness of someone to
write the code :-).

> I used to use sshfs to remotely mount my home directories between
> different computers running Linux, but I have switched to Samba for
> better performance. I would like to be able to keep using Samba without
> worrying about the relative lack of security. (I know this isn't really
> Samba's fault, but a legacy of its origins.)

Steve French and Jeff Layton are the experts in the Linux
CIFS kernel code, try bugging them :-).

Jeremy.
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Jeremy Allison on
On Fri, Jun 25, 2010 at 06:54:08PM +0000, Dan Lenski wrote:
> On Sun, 18 Apr 2010 10:29:38 -0400, simo wrote:
>
> > On Sun, 2010-04-18 at 10:05 -0400, Nico Kadel-Garcia wrote:
> >>
> >> Reviewing the docs, this tool requires Samba 3.2 or later on both the
> >> client and server sides. I'm therefore assuming that it's not
> >> compatible with a contemporary Windows fileserver: can you confirm
> >> this? Does anyone know if NetApp supports such encryption?
> >
> > It is an extension created by the Samba Team as part of unix extensions,
> > and at the moment the only client that implements it is smbclient. Not
> > even the in kernel cifs driver implements it. And we have no knowledge
> > of any other implementer adopting it yet.
>
> Does anyone know a time-frame for inclusion of transport encryption in
> the kernel CIFS driver? I'm really looking forward to this feature!

Steve, Jeff.... ping ? :-)
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Jeff Layton on
On Fri, 25 Jun 2010 12:20:41 -0700
Jeremy Allison <jra(a)samba.org> wrote:

> On Fri, Jun 25, 2010 at 06:54:08PM +0000, Dan Lenski wrote:
> > On Sun, 18 Apr 2010 10:29:38 -0400, simo wrote:
> >
> > > On Sun, 2010-04-18 at 10:05 -0400, Nico Kadel-Garcia wrote:
> > >>
> > >> Reviewing the docs, this tool requires Samba 3.2 or later on both the
> > >> client and server sides. I'm therefore assuming that it's not
> > >> compatible with a contemporary Windows fileserver: can you confirm
> > >> this? Does anyone know if NetApp supports such encryption?
> > >
> > > It is an extension created by the Samba Team as part of unix extensions,
> > > and at the moment the only client that implements it is smbclient. Not
> > > even the in kernel cifs driver implements it. And we have no knowledge
> > > of any other implementer adopting it yet.
> >
> > Does anyone know a time-frame for inclusion of transport encryption in
> > the kernel CIFS driver? I'm really looking forward to this feature!
>
> Steve, Jeff.... ping ? :-)
>

Sadly, there are enough bugs in this area that it may be a bit before
we get around to adding new features. I know Shirish was poking around
in here a while back, but I think he's working on other stuff now.

I think before we can reasonably add that we really need to move all of
the cifs crypto to use the kernel's standard crypto libs rather than the
homegrown routines they use now. There are some definite problems wrt
to unicode in there (not directly related to crypto, but it needs
fixing). NTLMSSP auth is also busted which is a rather important item.
--
Jeff Layton <jlayton(a)samba.org>
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba
From: Shirish Pargaonkar on
On Fri, Jun 25, 2010 at 2:34 PM, Jeff Layton <jlayton(a)samba.org> wrote:
> On Fri, 25 Jun 2010 12:20:41 -0700
> Jeremy Allison <jra(a)samba.org> wrote:
>
>> On Fri, Jun 25, 2010 at 06:54:08PM +0000, Dan Lenski wrote:
>> > On Sun, 18 Apr 2010 10:29:38 -0400, simo wrote:
>> >
>> > > On Sun, 2010-04-18 at 10:05 -0400, Nico Kadel-Garcia wrote:
>> > >>
>> > >> Reviewing the docs, this tool requires Samba 3.2 or later on both the
>> > >> client and server sides. I'm therefore assuming that it's not
>> > >> compatible with a contemporary Windows fileserver: can you confirm
>> > >> this? Does anyone know if NetApp supports such encryption?
>> > >
>> > > It is an extension created by the Samba Team as part of unix extensions,
>> > > and at the moment the only client that implements it is smbclient. Not
>> > > even the in kernel cifs driver implements it. And we have no knowledge
>> > > of any other implementer adopting it yet.
>> >
>> > Does anyone know a time-frame for inclusion of transport encryption in
>> > the kernel CIFS driver?  I'm really looking forward to this feature!
>>
>> Steve, Jeff.... ping ? :-)
>>
>
> Sadly, there are enough bugs in this area that it may be a bit before
> we get around to adding new features. I know Shirish was poking around
> in here a while back, but I think he's working on other stuff now.
>
> I think before we can reasonably add that we really need to move all of
> the cifs crypto to use the kernel's standard crypto libs rather than the
> homegrown routines they use now. There are some definite problems wrt
> to unicode in there (not directly related to crypto, but it needs
> fixing). NTLMSSP auth is also busted which is a rather important item.
> --
> Jeff Layton <jlayton(a)samba.org>
> --
> To unsubscribe from this list go to the following URL and read the
> instructions:  https://lists.samba.org/mailman/options/samba
>

Right now, I am at a stage where NTLMv2 authentication using NTMSSP works.
(It definitely was broken against Windows 7 and Windows 2008 server).
But signing does not. I am working on making NTLM2 Session Security work.
For signing, as I understand, I am attempting to use kernel crypto APIs
(for things like the key exchanged in type 3 message in ntlmssp)

Point of this is, I am trying to use kernel crypto APIs henceforth.
Along the way, I would
consider converting existing mac generation routine to crypto kernel APIs.
I am definitely considering implementing encryption also. If I am
generating all these
server and client signing and sealing keys, it may be little easier to
go one step
further and implement both, signing and sealing. I was mainly
focussing on signing
but will start investigating sealing also.

NTLM2 session security implementation looks daunting though, I am just beginging
to look into arc4 encryption to genereate ciphertext.

I do not see a problem with existing mac routines but converting them to
standard kernel crypto APIs should be way to go.
There are definitely issues in how cifs vfs client module implements
ntlmssp protocol
like how we decide/choose flags in type 1 message and how we react to
flags in type 2 message
etc. Signing for ntlmv2 is definitely busted.
--
To unsubscribe from this list go to the following URL and read the
instructions: https://lists.samba.org/mailman/options/samba