lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 31 Aug 2017 19:41:36 -0500
From:   Steve French <smfrench@...il.com>
To:     "L. A. Walsh" <linux-cifs@...nx.org>
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Pavel Shilovsky <pshilov@...rosoft.com>
Subject: Re: RFC: Revert move default dialect from CIFS to to SMB3"

On Thu, Aug 31, 2017 at 7:04 PM, L. A. Walsh <linux-cifs@...nx.org> wrote:
> Thorsten Leemhuis wrote:
>>
>> This reverts commit eef914a9eb5eb83e60eb498315a491cd1edc13a1 (
>> [SMB3] Improve security, move default dialect to SMB3 from old CIFS), as
>> it confuses users: https://bugzilla.kernel.org/show_bug.cgi?id=196599
>>
>> It was a patch to improve security by switching to SMB3 by default and
>> support SMB1 (aka CIFS) only when explicitly requested, as the latter
>> is not considered secure anymore (see below for details). This is one of
>> the rare cases where regressions are unavoidable and accepted in Linux.
>>
>
> ----
>    Why not SMB2.1?  Win7 is still in support and getting security updates.
> MS has not issued any updates for Win7 upgrading it to SMB3.0 for any
> reason (that I'm aware of) -- including security.
>    If there were security problems in Win7 w/SMB2.1, wouldn't MS
> issue patches -- as they did for WinXP just recently for a severe
> SMB1 bug?

This was discussed at length with Microsoft, others on the Samba team,
and various vendors at the last SMB3 test event, and the general
opinion was that we should move to:

1) multi-dialect negotiate starting at the minimum 'secure-enough'
dialect (distros can already do this by patching the user space tools,
with retry), offering SMB2.1 through SMB3.02 (secure SMB3.1.1 requires
an additional patch that is not ready) but this was not ready for 4.13
due to difficulties with the "validate negotiate" handling.  It is
planned for next release (move from SMB3 default to SMB2.1 through
SMB3.11)

2) In the interim, given the seriousness of security issues around
older dialects, pick the best compromise as the default and SMB3 was
considered more secure (it offers encryption e.g. which is required
for some modern servers like Azure).

There was some urgency in making this change for obvious reasons, but
it should be easier in 4.14 (and backport to stable presumably) when
multidialect support is complete.




-- 
Thanks,

Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ