[OpenAFS] Microsoft Security Hot Fix MS11-043 breaks OpenAFS
Mon, 20 Jun 2011 13:01:21 -0400
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
Content-Type: text/plain; charset=UTF-8
I can confirm that one incompatibility with MS11-043 is setting the
value to "0x0". There are other potential incompatibilities. If your
site is setting this value to anything other than "0x2" (SPNEGO
Authentication) please consider changing it.
If you are a site that either does not have this value set or has it set
to "0x2" and are experiencing problems with MS11-043, please open an
issue at email@example.com.
On 6/17/2011 11:24 AM, Jeffrey Altman wrote:
> Based upon feedback received from the community, there are systems on
> which MS11-043 is installed on which connectivity between the SMB
> Redirector and the OpenAFS SMB Server continues to work successfully.
> It is unclear at this point what percentage of systems are adversely
> affected and on which platforms. All of the systems that have reported=
> errors are either XP or Server 2003. I have yet to receive a report
> about a Vista, Win7 or Server 2008 system and I have not yet had time t=
> perform extensive testing across a range of operating system installs.
> When an incompatibility due to the installation of MS11-043 occurs the
> nbtstat -n output reports that "AFS <20>" is registered on the Microsof=
> Loopback adapter and there is a valid connection between the local
> machine name and "AFS". However, all attempts to perform a CreateFile(=
> operation on a file or directory in \\AFS will fail with
> ERROR_BAD_NET_RESP "The specified server cannot perform the requested
> operation." This error occurs when the input packet received by the SM=
> Redirector fails consistency checks.
> Additional research is going to need to be performed on affected
> systems. The brand and version of anti-malware products may be playing=
> a role. It is unclear.
> At this point, I would recommend testing of MS11-043 in your environmen=
> before performing a large scale rollout.
> Jeffrey Altman
> On 6/16/2011 10:40 AM, Jeffrey Altman wrote:
>> Please be aware that this past Tuesday Microsoft pushed out a Security=
>> Fix for the Microsoft SMB Redirector for all versions of Windows back =
>> XP and Server 2003. This hot fix, MS11-043, patches a critical
>> vulnerability in the SMB Redirector that can result in Remote Code
>> Execution. As a result I cannot recommend that this hot fix not be
>> applied. MS11-043 replaces MS11-019 and MS10-020.
>> MS11-043 when applied will break the OpenAFS Client. The SMB protocol=
>> responses issued by the OpenAFS SMB server implementation do not pass
>> the validation checks now imposed by the Microsoft SMB redirector.
>> At this time I have no knowledge of what changes were made to the
>> Microsoft SMB redirector and in what manner the OpenAFS SMB Server
>> responses are invalid.
>> The OpenAFS IFS implementation is not quite ready for broad production=
>> use but it may be the only option available to the community at this t=
>> Further information to follow on a possible rushed release cycle for t=
>> IFS functionality to the general public in its current state.
>> Jeffrey Altman
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
-----END PGP SIGNATURE-----