• 1 Votes
    12 Posts
    3k Views
    scottalanmillerS

    @Dashrender said in SMBv1 is removed in the Windows 10 Insider Preview Build 16226:

    @scottalanmiller said in SMBv1 is removed in the Windows 10 Insider Preview Build 16226:

    @dafyre said in SMBv1 is removed in the Windows 10 Insider Preview Build 16226:

    @scottalanmiller said in SMBv1 is removed in the Windows 10 Insider Preview Build 16226:

    Not quite the same as NFS 3 and NFS 4, but we intentionally use NFS 3 much of the time today even though NFS 4 is old.

    This may be good for a fork...but why hang on to NFSv3 instead of stepping up to NFSv4??

    Because the work differently and having the overhead of NFSv4 often does not make sense.

    Can you give more detail?

    They are very different protocols with a lot of different features. NFSv3 is much lighter than NFSv4.

  • Kooler on DFS-R Issues

    IT Discussion
    45
    2 Votes
    45 Posts
    8k Views
    KOOLERK

    @dafyre said in Kooler on DFS-R Issues:

    With Starwind's coming Linux release (or has it already been released?)... Would this not be done in a Linux VM? That would eliminate concerns about licensing and such.

    StarWind Linux VSA is released

    There's no problem to install anything like us into parent partition, question was is it OK to use it as a file server with a free version of Windows

  • Mac OS X Writing to NTFS

    Unsolved IT Discussion
    29
    3 Votes
    29 Posts
    5k Views
    scottalanmillerS

    @dafyre said in Mac OS X Writing to NTFS:

    @Mike-Davis said in Mac OS X Writing to NTFS:

    @scottalanmiller said in Mac OS X Writing to NTFS:

    So how is a Mac involved here? It seems like you are trying to do a Windows to Windows copy, no Mac in the process?

    Correct. It seems that a Mac unzipped the files to the windows server. There was a bug at the time that set the file type bit to something that makes windows think it's encrypted. (thus windows shows it as green and the encrypted check box is checked)

    All I'm trying to do now is copy the files from a server that is having issues to a new server.

    Where are you running the copy operation from? The new server or the server with issues?

    I'd suggest trying to run the copy FROM the server with issues.

    He can't, logging in causes the system to crash.

  • 1 Votes
    1 Posts
    2k Views
    No one has replied
  • 0 Votes
    14 Posts
    4k Views
    scottalanmillerS

    But real XS does have the SMB based ISO mount, it's just not made available for the production storage.

  • 2 Votes
    2 Posts
    967 Views
    mlnewsM

    From the Badlock page:

    What can attackers gain?

    The security vulnerabilities can be mostly categorised as man-in-the-middle or denial of service attacks.

    Man-in-the-middle (MITM) attacks:
    There are several MITM attacks that can be performed against a variety of protocols used by Samba. These would permit execution of arbitrary Samba network calls using the context of the intercepted user.

    Impact examples of intercepting administrator network traffic:
    Samba AD server - view or modify secrets within an AD database, including user password hashes, or shutdown critical services.
    standard Samba server - modify user permissions on files or directories.

    Denial-of-Service (DoS) attacks:
    Samba services are vulnerable to a denial of service from an attacker with remote network connectivity to the Samba service.
    Who is affected?

    Affected versions of Samba are:

    3.6.x,
    4.0.x,
    4.1.x,
    4.2.0-4.2.9,
    4.3.0-4.3.6,
    4.4.0
    Earlier versions have not been assessed.

    How can I fix my systems?

    Please apply the patches provided by the Samba Team and SerNet for EnterpriseSAMBA / SAMBA+ immediately.

    Patched versions are (both the interim and final security release have the patches):

    4.2.10 / 4.2.11,
    4.3.7 / 4.3.8,
    4.4.1 / 4.4.2.
    With the release of Samba 4.4.0 on March 22nd the 4.1 release branch has been marked DISCONTINUED (see Samba Release Planning). Please be aware that Samba 4.1 and below are therefore out of support, even for security fixes. There will be no official security releases for Samba 4.1 and below published by the Samba Team or SerNet (for EnterpriseSAMBA). We strongly advise users to upgrade to a supported release.

    Some vendors may choose to ship 4.4.1, 4.3.7, and 4.2.10 versions and add regression patches on top of them, due to wide scale and complexity of this release. Some may also just backport the patches to older releases. Please contact your Samba supplier for details.

    What further improvements after patching are suggested?

    Mitigations for man-in-the-middle (MITM) attacks:
    Network protections that could be used MITM attacks include DHCP snooping, ARP Inspection and 802.1x.

    It is recommended that administrators set these additional options, if compatible with their network environment:

    server signing = mandatory
    ntlm auth = no

    Without server signing = mandatory, Man in the Middle attacks are still possible against our file server and classic/NT4-like/Samba3 Domain controller. (It is now enforced on Samba's AD DC.) Note that this has heavy impact on the file server performance, so you need to decide between performance and security. These man in the Middle attacks for smb file servers are well known for decades.

    Without 'ntlm auth = no', there may still be clients not using NTLMv2, and these observed passwords may be brute-forced easily using cloud-computing resources or rainbow tables.

    Mitigations for denial-of-service (DoS) attack:
    Apply firewall rules on the server to permit connectivity only from trusted addresses.

    Will encryption protect against these attacks?

    The SMB protocol, by default, only encrypts credentials and commands while files are transferred in plaintext. It is recommended that in security / privacy sensitive scenarios encryption is used to protect all communications.

    Samba added encryption in version 3.2 in 2008, but only for Samba clients. Microsoft added SMB encryption support to SMB 3.0 in Windows 8 and Windows Server 2012. However, both of these types of encryption only protect communications, such a file transfers, after SMB negotiation and commands have been completed. It is this phase that contains the fixed vulnerabilities.

    Samba/SMB encryption is good practice but is not sufficient for protection against these vulnerabilities. Network-level encryption, such as IPSec, is required for full protection as a workaround.

    How bad is Badlock?

    The severity of Badlock according to the Common Vulnerability Scoring System (CVSS):

    CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
    Base: 7.1 (High); Temporal: 6.4 (Medium)

    Is this vulnerability exploited currently?

    It may be possible since we already have several PoC (none of them will be released in the near future).

    What does "Badlock" stand for?

    "Badlock" was meant to be a rather generic name and does not point to any specifics.

    Yet Another Bug With A Logo?

    What branded bugs are able to achieve is best said with one word: Awareness. Furthermore names for bugs can serve as unique identifiers, other than different CVE/MS bug IDs.

    It is a thin line between drawing attention to a severe vulnerability that should be taken seriously and overhyping it. This process didn't start with the branding - it started a while ago with everyone working on fixes. The main goal of this announcement was to give a heads up. Vendors and distributors of Samba are being informed before a security fix is released in any case. This is part of any Samba security release process.

    Who found the Badlock Bug?

    Badlock was discovered by Stefan Metzmacher. He's a member of the international Samba Core Team and works at SerNet on Samba. He reported the bug to Microsoft and has been working closely with them to fix the problem.

  • 2 Votes
    66 Posts
    23k Views
    olivierO

    @Dashrender Okay let's retake a clean example: one VM in a SR, with one 4GB VDI:

    # lvscan inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/MGT' [4.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-770ceeac-e97e-4e05-b9c5-892b97b9d16e' [4.02 GiB] inherit

    After first snapshot:

    # lvscan inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/MGT' [4.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-38e2156f-da74-4edb-ac83-56fda54cfe55' [1.75 GiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-770ceeac-e97e-4e05-b9c5-892b97b9d16e' [4.02 GiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-f18856a5-039b-4d84-bf6c-a259d0f49a9e' [8.00 MiB] inherit

    After second snapshot:

    # lvscan inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/MGT' [4.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-38e2156f-da74-4edb-ac83-56fda54cfe55' [1.75 GiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-f18856a5-039b-4d84-bf6c-a259d0f49a9e' [8.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-770ceeac-e97e-4e05-b9c5-892b97b9d16e' [4.02 GiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-68408f33-5a69-4b3b-afdd-a2cfabcad9ba' [8.00 MiB] inherit

    As you can see, we got a second 8 MiB logical volume, nothing more (base parent and active VDI doesn't change).

    Let's remove the latest snapshot:

    # lvscan inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/MGT' [4.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-38e2156f-da74-4edb-ac83-56fda54cfe55' [1.75 GiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-f18856a5-039b-4d84-bf6c-a259d0f49a9e' [8.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-770ceeac-e97e-4e05-b9c5-892b97b9d16e' [4.02 GiB] inherit

    It removes the previously created volume, as expected. Now, let's remove the initial snapshot. Durin few seconds, we'll have this:

    lvscan inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/MGT' [4.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-38e2156f-da74-4edb-ac83-56fda54cfe55' [1.75 GiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-770ceeac-e97e-4e05-b9c5-892b97b9d16e' [8.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/leaf_770ceeac-e97e-4e05-b9c5-892b97b9d16e_38e2156f-da74-4edb-ac83-56fda54cfe55' [4.00 MiB] inherit

    But it will be automatically "garbage collected" when the system will see than the chain doesn't have any snapshot in it (after few seconds in this case):

    # lvscan inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/MGT' [4.00 MiB] inherit inactive '/dev/VG_XenStorage-e27c48de-509f-3fec-d627-7f348062ab1a/VHD-770ceeac-e97e-4e05-b9c5-892b97b9d16e' [4.02 GiB] inherit

    We are back to the initial situation.

  • 3 Votes
    27 Posts
    6k Views
    DashrenderD

    @scottalanmiller said:

    Where DNS != DNS

    That was CONFUSING

    I knew exactly what @scottalanmiller issue was when I read his post.. I updated my post for clarity.

  • 4 Votes
    1 Posts
    1k Views
    No one has replied
  • Kind of ethical question?

    IT Discussion
    10
    2 Votes
    10 Posts
    3k Views
    scottalanmillerS

    One could easily argue that NAS and other appliances are the antithesis of simplicity as they are so complex that you require the vendor to support them rather than being able to support them yourself.

    I'm not saying that I agree, only that it is a valid point and needs to be considered. Appliancization is not an automatic move to simplicity on its own.

  • 0 Votes
    18 Posts
    5k Views
    scottalanmillerS

    @jshiers said:

    Maybe I should just start do inplace upgrades on my servers!!!!

    That's an option for sure. Snap them, upgrade, test and see.

  • Old SMB Security Flaw Still Exists

    News
    1
    2 Votes
    1 Posts
    1k Views
    No one has replied
  • Samba 4.2.3 Released

    News
    1
    1 Votes
    1 Posts
    800 Views
    No one has replied
  • 0 Votes
    37 Posts
    9k Views
    mlnewsM

    Darn it, again!

  • Any tools to delete long named files?

    IT Discussion
    15
    1 Votes
    15 Posts
    3k Views
    ?

    You might try some of these on the Mac http://alternativeto.net/software/robocopy/?platform=mac

  • Beat the System with Pertino

    IT Discussion
    3
    -1 Votes
    3 Posts
    2k Views
    thanksajdotcomT

    @Dashrender said:

    I'm a bit lost.

    You have two NASs at home mounted to a Linux box, that you are then sharing to CIFS so you can mount them on a Windows box?

    Is the Windows box not on the local LAN? If not I guess that's why you have Pertino as part of this, because you are Pertino'ing from a non local Windows box to the Linux box which is offering a pass-through to the NASs?

    If your Windows box is local to NASs, why bother going through the Linux box?

    The Windows box and the Linux box are both on the same LAN as the NASes. This is more so I can access the NASes easily remotely on my Pertino network.

  • Why Do Mobile Devices Not Support SMB Protocol?

    IT Discussion
    11
    1 Votes
    11 Posts
    3k Views
    Bill KindleB

    ES File Explorer seems to work for me on Android 4.0