Received: by 10.223.185.116 with SMTP id b49csp4490888wrg; Mon, 26 Feb 2018 19:45:41 -0800 (PST) X-Google-Smtp-Source: AH8x224Nqq1rG/qsouKYfIvR6ejn/yCrtzTjzq4qru3UBT0kpApEXfYreC1JDtrM4EmDETd0KGeh X-Received: by 10.99.114.80 with SMTP id c16mr10189871pgn.436.1519703140958; Mon, 26 Feb 2018 19:45:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519703140; cv=none; d=google.com; s=arc-20160816; b=WNIcfUCSzlC7JxMXj0sRHQDKZkSvv/AePjAUXX3c/QUPcf3/I5OJvA9nX7xZswVVTr 1cXThvoGYiZuMbmSIkRTKfppJp/2WCtj3r9nByed2fUu36xPammjBeycoHXxEzu33hHd +bfpqtn/ampKOZA4nYWBW+4fVVOl8wARPiXbh5oFsOanwcxtThzE+kOSMWHD1L7bzqgc N74VR28GQPCPIL6YNeP6vbABcl00QFVKCSSIjM5Je7XTpr0r8IAEHlvnWRmet1NgB2sU T+/bJSHPg50i1cLZPo8txCPJAuda8T4xtoB9+z58i6OV8WWOkOAU6n5F0IwgFHpni259 h0bQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:from:subject:arc-authentication-results; bh=+qEPEbhNhVPDl7lF4OrOwakYjEqaeUfUkffT9kZ6xkY=; b=A79r134qPO8HVfT8yqjN7gY0UQkYHhVG51OU4ebp1FU2PBIHVxXJn5Q7vhbB64+Pej UOrdSajearWzPHEOfVEaPg9yP91rW+eYQvJk3DJhJ/2dIevC5C4SxZtSgLSOVJmuEM52 zs1Oh/FTKojpHi4HYInWKfmkNG67RqBhtFjZ5vGfs8iJ7E2lHedT6CSq2iRsoBckyzSF uqa6rBizlivXIq7NBrCxIcvZ1m1C9oeHRm6gVtGlsR1toIWEzByq0cBScx7paelfnjFn lgAqSzVBMRD+e4h+ii6/NXS69dyPUBV/IKlzc+2lpGaGrsDLeZGz5uWeakcFwwgNuWZA cm/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=csail.mit.edu Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 43-v6si7817961plb.548.2018.02.26.19.45.26; Mon, 26 Feb 2018 19:45:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=csail.mit.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751668AbeB0Dos (ORCPT + 99 others); Mon, 26 Feb 2018 22:44:48 -0500 Received: from outgoing-stata.csail.mit.edu ([128.30.2.210]:34177 "EHLO outgoing-stata.csail.mit.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751514AbeB0Dop (ORCPT ); Mon, 26 Feb 2018 22:44:45 -0500 Received: from 67-148-5-85.dia.static.qwest.net ([67.148.5.85] helo=srivatsab-m01.vmware.com) by outgoing-stata.csail.mit.edu with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.82) (envelope-from ) id 1eqWC2-0004Tj-3L; Mon, 26 Feb 2018 22:44:42 -0500 Subject: Re: [PATCH 4.13 28/43] SMB3: Validate negotiate request must always be signed From: "Srivatsa S. Bhat" To: Greg Kroah-Hartman , Thomas Backlund , Steve French , =?UTF-8?Q?Aur=c3=a9lien_Aptel?= Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, lsahlber@redhat.com, pshilov@microsoft.com, linux-cifs@vger.kernel.org References: <20171031095530.520746935@linuxfoundation.org> <20171031095531.633196173@linuxfoundation.org> <97340c9a-0ea2-0d3d-cf26-58c799d76cae@mageia.org> <20171101151803.GB31285@kroah.com> <4ba67095-4075-688f-d3fb-157847aee4d9@csail.mit.edu> Message-ID: <28ffc363-5140-5685-d288-6e3dc07c6369@csail.mit.edu> Date: Mon, 26 Feb 2018 19:44:28 -0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <4ba67095-4075-688f-d3fb-157847aee4d9@csail.mit.edu> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/3/18 6:15 PM, Srivatsa S. Bhat wrote: > On 11/1/17 8:18 AM, Greg Kroah-Hartman wrote: >> On Tue, Oct 31, 2017 at 03:02:11PM +0200, Thomas Backlund wrote: >>> Den 31.10.2017 kl. 11:55, skrev Greg Kroah-Hartman: >>>> 4.13-stable review patch. If anyone has any objections, please let me know. >>>> >>>> ------------------ >>>> >>>> From: Steve French >>>> >>>> commit 4587eee04e2ac7ac3ac9fa2bc164fb6e548f99cd upstream. >>>> >>>> According to MS-SMB2 3.2.55 validate_negotiate request must >>>> always be signed. Some Windows can fail the request if you send it unsigned >>>> >>>> See kernel bugzilla bug 197311 >>>> >>>> Acked-by: Ronnie Sahlberg >>>> Signed-off-by: Steve French >>>> Signed-off-by: Greg Kroah-Hartman >>>> >>>> --- >>>> fs/cifs/smb2pdu.c | 3 +++ >>>> 1 file changed, 3 insertions(+) >>>> >>>> --- a/fs/cifs/smb2pdu.c >>>> +++ b/fs/cifs/smb2pdu.c >>>> @@ -1963,6 +1963,9 @@ SMB2_ioctl(const unsigned int xid, struc >>>> } else >>>> iov[0].iov_len = get_rfc1002_length(req) + 4; >>>> + /* validate negotiate request must be signed - see MS-SMB2 3.2.5.5 */ >>>> + if (opcode == FSCTL_VALIDATE_NEGOTIATE_INFO) >>>> + req->hdr.sync_hdr.Flags |= SMB2_FLAGS_SIGNED; >>>> rc = SendReceive2(xid, ses, iov, n_iov, &resp_buftype, flags, &rsp_iov); >>>> cifs_small_buf_release(req); >>>> >>>> >>>> >>> >>> This one needs to be backported to all stable kernels as the commit that >>> introduced the regression: >>> ' >>> 0603c96f3af50e2f9299fa410c224ab1d465e0f9 >>> SMB: Validate negotiate (to protect against downgrade) even if signing off >>> >>> is backported in stable trees as of: 4.9.53, 4.4.90, 3.18.73 >> >> Oh wait, it breaks the builds on older kernels, that's why I didn't >> apply it :) >> >> Can you provide me with a working backport? >> > > Hi Steve, > > Is there a version of this fix available for stable kernels? > Hi Greg, Mounting SMB3 shares continues to fail for me on 4.4.118 and 4.9.84 due to the issues that I have described in detail on this mail thread. Since there is no apparent fix for this bug on stable kernels, could you please consider reverting the original commit that caused this regression? That commit was intended to enhance security, which is probably why it was backported to stable kernels in the first place; but instead it ends up breaking basic functionality itself (mounting). So in the absence of a proper fix, I don't see much of an option but to revert that commit. So, please consider reverting the following: commit 02ef29f9cbb616bf419 "SMB: Validate negotiate (to protect against downgrade) even if signing off" on 4.4.118 commit 0e1b85a41a25ac888fb "SMB: Validate negotiate (to protect against downgrade) even if signing off" on 4.9.84 They correspond to commit 0603c96f3af50e2f9299fa410c224ab1d465e0f9 upstream. Both these patches should revert cleanly. Thank you! Regards, Srivatsa