CVE-2016-2111: docs-xml/smbdotconf: default "raw NTLMv2 auth" to "no"
authorStefan Metzmacher <metze@samba.org>
Tue, 15 Mar 2016 20:59:42 +0000 (21:59 +0100)
committerStefan Metzmacher <metze@samba.org>
Tue, 12 Apr 2016 17:25:24 +0000 (19:25 +0200)
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11749

Signed-off-by: Stefan Metzmacher <metze@samba.org>
Reviewed-by: Alexander Bokovoy <ab@samba.org>
docs-xml/smbdotconf/security/rawntlmv2auth.xml
lib/param/loadparm.c
source3/param/loadparm.c

index ef262977a0c789326352caee85dc7c1611ad7a07..30e7280bc5dd18e21da83833463973da95d431f3 100644 (file)
     and <command moreinfo="none">ntlm auth</command> are all disabled,
     then only clients with SPNEGO support will be permitted.
     That means NTLMv2 is only supported within NTLMSSP.</para>
-
-    <para>Note that the default will change to "no" with Samba 4.5.</para>
 </description>
 
-<value type="default">yes</value>
-<value type="example">no</value>
+<related>lanman auth</related>
+<related>ntlm auth</related>
+<value type="default">no</value>
 </samba:parameter>
index 3a00cc5ea307a0ce040cdb17543cc3e6b76cce33..696c2d679905ccb42128ae6126dc3c4a3ac21b97 100644 (file)
@@ -2629,7 +2629,7 @@ struct loadparm_context *loadparm_init(TALLOC_CTX *mem_ctx)
        lpcfg_do_global_parameter(lp_ctx, "ClientNTLMv2Auth", "True");
        lpcfg_do_global_parameter(lp_ctx, "LanmanAuth", "False");
        lpcfg_do_global_parameter(lp_ctx, "NTLMAuth", "True");
-       lpcfg_do_global_parameter(lp_ctx, "RawNTLMv2Auth", "True");
+       lpcfg_do_global_parameter(lp_ctx, "RawNTLMv2Auth", "False");
        lpcfg_do_global_parameter(lp_ctx, "client use spnego principal", "False");
 
        lpcfg_do_global_parameter(lp_ctx, "UnixExtensions", "True");
index 3bdec236005c80d2753df4b4a9eb89b320cd103d..07e1aec462e7bb0cbe3c0d2a8d22e91f84ac71d7 100644 (file)
@@ -690,7 +690,7 @@ static void init_globals(struct loadparm_context *lp_ctx, bool reinit_globals)
        Globals.client_plaintext_auth = false;  /* Do NOT use a plaintext password even if is requested by the server */
        Globals.lanman_auth = false;    /* Do NOT use the LanMan hash, even if it is supplied */
        Globals.ntlm_auth = true;       /* Do use NTLMv1 if it is supplied by the client (otherwise NTLMv2) */
-       Globals.raw_ntlmv2_auth = true; /* Allow NTLMv2 without NTLMSSP */
+       Globals.raw_ntlmv2_auth = false; /* Reject NTLMv2 without NTLMSSP */
        Globals.client_ntlmv2_auth = true; /* Client should always use use NTLMv2, as we can't tell that the server supports it, but most modern servers do */
        /* Note, that we will also use NTLM2 session security (which is different), if it is available */