]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
SMB3: Validate negotiate request must always be signed
authorSteve French <smfrench@gmail.com>
Wed, 25 Oct 2017 20:58:31 +0000 (15:58 -0500)
committerSasha Levin <alexander.levin@microsoft.com>
Wed, 23 May 2018 01:33:48 +0000 (21:33 -0400)
[ Upstream commit 4587eee04e2ac7ac3ac9fa2bc164fb6e548f99cd ]

According to MS-SMB2 3.2.55 validate_negotiate request must
always be signed. Some Windows can fail the request if you send it unsigned

See kernel bugzilla bug 197311

CC: Stable <stable@vger.kernel.org>
Acked-by: Ronnie Sahlberg <lsahlber.redhat.com>
Signed-off-by: Steve French <smfrench@gmail.com>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
fs/cifs/smb2pdu.c

index 69422157c71b847db46af398f8d10363db3e28e9..be61e1b2b6d596f9c7e6367a239220214899f772 100644 (file)
@@ -1353,6 +1353,9 @@ SMB2_ioctl(const unsigned int xid, struct cifs_tcon *tcon, u64 persistent_fid,
        } else
                iov[0].iov_len = get_rfc1002_length(req) + 4;
 
+       /* validate negotiate request must be signed - see MS-SMB2 3.2.5.5 */
+       if (opcode == FSCTL_VALIDATE_NEGOTIATE_INFO)
+               req->hdr.Flags |= SMB2_FLAGS_SIGNED;
 
        rc = SendReceive2(xid, ses, iov, num_iovecs, &resp_buftype, 0);
        rsp = (struct smb2_ioctl_rsp *)iov[0].iov_base;