[cifs-protocol] [REG:111051779565831] RE: dfs referral for sysvol and windows XP

Hongwei Sun hongweis at microsoft.com
Tue Jun 7 16:01:06 MDT 2011


Matthieu,

  I confirmed that there is a problem with the Netmon parser when displaying ReferralEntryFlag.  The ReferralEntryFlags should be in little endian.  In the packet, it should be parsed as 0x0004 that has TargetSetBoundary bit set for the first entry.  So this is not the problem.   I will file a Netmon parser bug for that.

  After looking further at the traces (XP to Samba and XP to Windows server 2008R2), I think that the DFS referral v4 returned by Samba doesn't seem to have any problem.  The only differences between two responses are if the DFSPath and DFSAlternativePath are shared between ReferralEntries.      This should not be the problem if  the correct offsets are used.   The details are shown as below:

  Response from Samba:

     DfsPath: Index:1 \w2k8r2.home.matws.net\sysvol
     DfsAlternatePath: Index:1 \w2k8r2.home.matws.net\sysvol
     TargetPath: Index:1 \s2-w2k8r2.w2k8r2.home.matws.net\sysvol
     DfsPath: Index:2 \w2k8r2.home.matws.net\sysvol
     DfsAlternatePath: Index:2 \w2k8r2.home.matws.net\sysvol
     TargetPath: Index:2 \ares.w2k8r2.home.matws.net\sysvol     

Response from Windows:
  
     DfsPath: \w2k8r2.home.matws.net\sysvol
     DfsAlternatePath: \w2k8r2.home.matws.net\sysvol
     TargetPath: Index:1 \s2-w2k8r2.w2k8r2.home.matws.net\sysvol
     TargetPath: Index:2 \ares.w2k8r2.home.matws.net\sysvol


   It seems  that  XP client did  process  the DFS Referral Response v4 from Samba server correctly.   The following is the analysis of the events.

     Packet  339	XP  	ARES  	DFSC	DFSC:Get DFS Referral Request, FileName: \w2k8r2.home.matws.net\sysvol, MaxReferralLevel: 4
     Packet   340	ARES  	XP  	DFSC	DFSC:Get DFS Referral Response, NumberOfReferrals: 2 VersionNumber: 4

	                Two  TargetPaths returned :  \s2-w2k8r2.w2k8r2.home.matws.net\sysvol,   \ares.w2k8r2.home.matws.net\sysvol     
 
    Packet  345	XP  	ARES  	DNS	DNS:QueryId = 0xB8C8, QUERY (Standard query), Query  for s2-w2k8r2.w2k8r2.home.matws.net
    Packet  346	ARES  	XP  	DNS	DNS:QueryId = 0xB8C8, QUERY (Standard query), Response - Success, 172.16.100.27
     Packet 442	ARES  	XP  	ICMP	ICMP:Destination Unreachable Message, Host Unreachable, 172.16.100.27

                           The client goes to the first target (s2-w2k8r2.w2k8r2.home.matws.net), but it is not reachable.   Why was  s2-w2k8r2.w2k8r2.home.matws.net not accessible ?  Was this intended because you were testing the DFS target failover ?

   Packet 634	XP  	ARES  	ICMP	ICMP:Echo Request Message, From 172.16.101.16 To 172.16.101.1
   Packet 657	XP  	ARES  	KerberosV5	KerberosV5:TGS Request Realm: W2K8R2.HOME.MATWS.NET Sname: cifs/ares.w2k8r2.home.matws.net
   Packet 659	ARES  	XP  	KerberosV5	KerberosV5:TGS Response Cname: Administrator
   Packet 668	XP  	ARES  	SMB	SMB:C; Tree Connect Andx, Path = \\ARES.W2K8R2.HOME.MATWS.NET\SYSVOL, Service = ?????

                         The client fails over to the second target (ares.w2k8r2.home.matws.net) and use the Kerberos to do session setup.

    It seems to me that when it fell back to NTLM, it was trying to access IPC$ for srvsrc service, not to access SYSVOL or NETLOGON. I don't see this in the trace between Windows.   I am not sure if it is related to the DFS Referral Response v4.

  Please let me know what you think.

Thanks!

Hongwei
   

-----Original Message-----
From: Matthieu Patou [mailto:mat at samba.org] 
Sent: Tuesday, May 31, 2011 4:44 PM
To: Hongwei Sun
Cc: pfif at tridgell.net; cifs-protocol at samba.org; MSSolve Case Email
Subject: Re: [REG:111051779565831] RE: [cifs-protocol] dfs referral for sysvol and windows XP

On 27/05/2011 03:35, Hongwei Sun wrote:
> Matthieu,
>
>    I used your complete trace (dfs2.pcap) to see the entire scenario.    The reason it falls back to NTLM from Kerberos  is because it cannot get the TGS ticket for SPN  (cifs/w2k8r2.home.matws.net).  The error is  KDC_ERR_S_PRINCIPAL_UNKNOWN.  Have you checked if the SPN has been registered properly ?
Yeah I know why it falls back to NTLM actually, it's because if fails to accept correctly the DFS referral answer we've sent.
Because the SPN cifs/domainname do not exists as client should instead use DFS to find the closest DC for SYSVOL/Netlogon (and other domain DFS).


> 	339	3:34:02 PM 5/17/2011	24.0070710	XP  	ARES  	DFSC	DFSC:Get DFS Referral Request, FileName: \w2k8r2.home.matws.net\sysvol, MaxReferralLevel: 4
> 	340	3:34:02 PM 5/17/2011	24.0145370	ARES  	XP  	DFSC	DFSC:Get DFS Referral Response, NumberOfReferrals: 2 VersionNumber: 4
>
> 	488	3:34:22 PM 5/17/2011	43.8453860	XP  	ARES  	KerberosV5	KerberosV5:TGS Request Realm: W2K8R2.HOME.MATWS.NET Sname: cifs/w2k8r2.home.matws.net
> 	489	3:34:22 PM 5/17/2011	43.8507430	ARES  	XP  	KerberosV5	KerberosV5:KRB_ERROR  - KDC_ERR_S_PRINCIPAL_UNKNOWN (7)
>
>     As far as the  DFS Referral version 4,  I can see one thing that doesn't meet the requirement to be a version 4 of DFS referral.   The TargetSetBoundary bit  in  ReferralEntryFlags  of the first referral response entry MUST be set to 1, as per section 2.2.4.4 of MS-DFSC.     In the both response entries returned from Samba , this bit is always 0.
>
>      - ReferralEntryFlags: 1024 (0x400)
>         unused1:             (0000010000000...) - Unused
>         TargetSetBoundary:   (.............0..) - The target corresponding to this referral entry is not the first target of a target set.
>         NameListReferral:    (..............0.) - This is not a trusted domain or DC list referral
>         unused2:             (...............0) - Unused
That's intresting because the way wireshark display this is not the same.

It sees this two bytes in the little endian order while you see them in the big endian.
Samba4 is also doing this way:
                             v4: struct dfs_referral_v3
                                 size                     : 0x0022 (34)
                                 server_type              : 
DFS_SERVER_NON_ROOT (0)
                                 entry_flags              : 
DFS_FLAG_REFERRAL_FIRST_TARGET_SET (4)
                                 ttl                      : 0x00000384 (900)
                                 referrals                : union 
dfs_referral(case 0)
                                 r1: struct dfs_normal_referral
                                     DFS_path                 : *
                                         DFS_path                 : 
'\w2k8r2.home.matws.net\sysvol'
                                     DFS_alt_path             : *
                                         DFS_alt_path             : 
'\w2k8r2.home.matws.net\sysvol'
                                     netw_address             : *
                                         netw_address             : 
'\s2-w2k8r2.w2k8r2.home.matws.net\sysvol'

I'm thinking that's correct still as when I take DFS request for DC resolution (the one when the client send \domain.tld or \NetbiosDomain) from Windows 2003 I have:

                             v3: struct dfs_referral_v3
                                 size                     : 0x0022 (34)
                                 server_type              : 
DFS_SERVER_NON_ROOT (0)
                                 entry_flags              : 
DFS_FLAG_REFERRAL_DOMAIN_RESP (2)
                                 ttl                      : 0x00000258 (600)
                                 referrals                : union 
dfs_referral(case 2)
                                 r2: struct dfs_domain_referral
                                     special_name             : *
                                         special_name             : 
'\msw2k3.tst'
                                     nb_expanded_names        : 0x0001 (1)
                                     expanded_names           : *
                                         expanded_names: ARRAY(1)
                                             [0]                      : 
'\w2k3advz01.msw2k3.tst'
                                 service_site_guid        : union 
dfs_padding(case 16)

And for the packet 337
                             v3: struct dfs_referral_v3
                                 size                     : 0x0022 (34)
                                 server_type              : 
DFS_SERVER_NON_ROOT (0)
                                 entry_flags              : 
DFS_FLAG_REFERRAL_DOMAIN_RESP (2)
                                 ttl                      : 0x00000258 (600)
                                 referrals                : union 
dfs_referral(case 2)
                                 r2: struct dfs_domain_referral
                                     special_name             : *
                                         special_name             : 
'\w2k8r2.home.matws.net'
                                     nb_expanded_names        : 0x0002 (2)
                                     expanded_names           : *
                                         expanded_names: ARRAY(2)
                                             [0]                      : 
'\s2-w2k8r2.w2k8r2.home.matws.net'
                                             [1]                      : 
'\ares.w2k8r2.home.matws.net'

So in both case our pidl generated parser reads the same way ReferralEntryFlags (entry_flags) should the request come from a Windows Server or from a Samba server.

I put here: http://www.matws.net/mat/misc/dfs3_from_w2k8r2.pcap.gz
another capture made from w2k8r2 with XP. For me the packets looks very similar (both are DC on the same domain btw !).

Matthieu.

>      Please let me know what you think.
>
> Thanks!
>
> Hongwei
>
>
> -----Original Message-----
> From: Matthieu Patou [mailto:mat at samba.org]
> Sent: Sunday, May 22, 2011 3:52 PM
> To: Hongwei Sun
> Cc:pfif at tridgell.net;cifs-protocol at samba.org; MSSolve Case Email
> Subject: Re: [REG:111051779565831] RE: [cifs-protocol] dfs referral 
> for sysvol and windows XP
>
> Hello Hongwei,
>
> So the attached pcap show dfs referral traffic between a S4 and XP hosts.
>
> Where we can see that XP is requesting a level 4 referral and that S4 answers to it with an answer following the specification.
>
> After this XP is blocked or fallback to NTLM auth (not shown in this capture but in this one:http://www.matws.net/mat/misc/dfs2.pcap.gz).
>
> So I'm wondering if it's normal, maybe XP didn't appreciate the level 4 answers.
>
> Matthieu.
>
> On 19/05/2011 20:23, Hongwei Sun wrote:
>> Hi, Matthieu,
>>
>>      I need some clarification about your question.  I have a problem to match the packets to what you have described.    The trace has only  6 packets.  The following are all the packets in the trace:
>>
>> 1	3:28:33 PM 5/17/2011	0.0000000	172.16.101.16	172.16.101.1	DFSC	DFSC:Get DFS Referral Request, FileName:<empty>, MaxReferralLevel: 3
>> 2	3:28:33 PM 5/17/2011	0.0001600	172.16.101.1	172.16.101.16	DFSC	DFSC:Get DFS Referral Response, NumberOfReferrals: 2 VersionNumber: 3
>> 3	3:28:33 PM 5/17/2011	0.1360020	172.16.101.16	172.16.101.1	DFSC	DFSC:Get DFS Referral Request, FileName: \w2k8r2.home.matws.net, MaxReferralLevel: 3
>> 4	3:28:33 PM 5/17/2011	0.1434180	172.16.101.1	172.16.101.16	DFSC	DFSC:Get DFS Referral Response, NumberOfReferrals: 1 VersionNumber: 3
>> 5	3:28:33 PM 5/17/2011	0.1440790	172.16.101.16	172.16.101.1	DFSC	DFSC:Get DFS Referral Request, FileName: \w2k8r2.home.matws.net\sysvol, MaxReferralLevel: 4
>> 6	3:28:33 PM 5/17/2011	0.1514540	172.16.101.1	172.16.101.16	DFSC	DFSC:Get DFS Referral Response, NumberOfReferrals: 2 VersionNumber: 4
>>
>>      Could you explain more about the configuration of your testing , scenario as well as the behavior in question?    It will be better if you can point out the packets in question.
>>
>> Thanks!
>>
>> Hongwei
>>
>>
>> -----Original Message-----
>> From:cifs-protocol-bounces at cifs.org
>> [mailto:cifs-protocol-bounces at cifs.org] On Behalf Of Matthieu Patou
>> Sent: Tuesday, May 17, 2011 4:09 PM
>> To: Interoperability Documentation Help;pfif at tridgell.net; 
>> cifs-protocol at samba.org
>> Subject: [cifs-protocol] dfs referral for sysvol and windows XP
>>
>> Hello doc help,
>>
>> While revisiting the DFS implementation for samba I remade some tests with XP and It seems that when doing the last step in order to resolve \\domain.tld\sysvol.
>> Even if we tend to send the same frame, XP comes to samba 4 when asking for a DC holding \\domain.tld\sysvol. So as we support this level we return entry for this level.
>>
>> But then it fails to connect to \\dc.domain.tld\sysvol and keep doing ntlm connection to \\domain.tld\sysvol.
>>
>> Is this "normal" ?
>>
>> I put another capture here:http://www.matws.net/mat/misc/dfs2.pcap.gz
>> where we can clearly see that the client starts to do NTLM auth to connect to \\domain.tld.
>>
>> Thanks for your answers.
>>
>> Matthieu.
>>
>> --
>> Matthieu Patou
>> Samba Teamhttp://samba.org
>> Private repohttp://git.samba.org/?p=mat/samba.git;a=summary
>>
>>
> --
> Matthieu Patou
> Samba Teamhttp://samba.org
> Private repohttp://git.samba.org/?p=mat/samba.git;a=summary
>
>
>


--
Matthieu Patou
Samba Teamhttp://samba.org
Private repohttp://git.samba.org/?p=mat/samba.git;a=summary



More information about the cifs-protocol mailing list