svn commit: samba r21903 - in branches/SAMBA_3_0/source/libsmb: .

Andrew Bartlett abartlet at samba.org
Mon Mar 26 08:51:49 GMT 2007


On Sun, 2007-03-25 at 22:48 -0700, Jeremy Allison wrote:
> On Mon, Mar 26, 2007 at 01:21:30PM +1000, Andrew Bartlett wrote:
> > On Tue, 2007-03-20 at 21:34 -0700, Jeremy Allison wrote:
> > > On Wed, Mar 21, 2007 at 03:27:17PM +1100, Luke Howard wrote:
> > > > 
> > > > I'd love to see/review the spec.
> > > 
> > > I'll definately include you.
> > > 
> > > > Are you going to
> > > > keep the SMB signature even if you use GSS
> > > > encryption? This could be a cheap way to get AEAD
> > > > (integrity protecting the entire PDU whilst only
> > > > encrypting the payload).
> > > 
> > > I wasn't planning to. In fact the current code
> > > turns off the SMB signature once you've got
> > > the transport encryption on. Current SMB
> > > signatures have lots of problems as they're
> > > mid-based, so the current server encryption
> > > code (the NTLM base) insists on sign+seal
> > > (the same way it's done on RPC packets)
> > > and will drop the connection if you try
> > > and NTLMSSP negotiate anything less than
> > > sign+seal at the transport layer.
> > > 
> > > Currently the signature is done over the
> > > <len>0xFF SMB header + entire packet, whereas the
> > > encryption is only done on the part of
> > > the payload following the <len>0xFF SMB
> > > header.
> > 
> > That sounds almost sane...
> 
> Why thankyou !

It's much better that what we were discussing at the CIFS conf. 

> > I presume this is strictly one NTLM packet per SMB request?
> 
> Yep.
> 
> > Given this much is being encrypted, I would have preferred the way SASL
> > does things, which is <len><<sig><blob>>, where <sig><blob> is defined
> > by the encryption mech.  (And encrypted packets may or may not line up
> > with underlying packets).
> 
> It's essentially <len><blob><sig>. I think that's cleaner as it allows
> in-place enc. then adding the blob at the end. Note that <len> isn't
> signed.
> 
> > But I hope to work with you to get Samba4 compatible with this, it
> > shouldn't be hard at all.
> 
> Indeed, the main effort (once I've finished the gss and gss-spnego
> setup) is to get as many clients done as possible.

BTW, given that in this mode, we will need to do full GSSAPI, we will
want to avoid using the session key.  I suggest falling back to
"SystemLibraryDTC", to match other sealed transports (like DCE/RPC).

Also, how is this negotiated? 

Andrew Bartlett
-- 
Andrew Bartlett                                http://samba.org/~abartlet/
Authentication Developer, Samba Team           http://samba.org
Samba Developer, Red Hat Inc.                  http://redhat.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.samba.org/archive/samba-technical/attachments/20070326/1784fa1e/attachment.bin


More information about the samba-technical mailing list