diff options
author | Volker Lendecke <vl@samba.org> | 2015-10-06 16:10:43 +0200 |
---|---|---|
committer | Karolin Seeger <kseeger@samba.org> | 2015-10-28 10:56:22 +0100 |
commit | 3abfde02f840e67dc6b416bdb3ae60ecd0b65000 (patch) | |
tree | 64b49891224ac6ef411a39be9ca9853543c78e1c /source3/smbd | |
parent | 2d39d049a902b4c7eb7cfef7224a5493c92f2e90 (diff) | |
download | samba-3abfde02f840e67dc6b416bdb3ae60ecd0b65000.tar.gz |
smbd: Send SMB2 oplock breaks unencrypted
This is not what Windows server does, but it seems that Windows
clients expect. Windows->Windows never runs into this issue, because
an encryption-enabled SMB3 connection will always use leases, and lease
breaks *are* unencrypted...
You can reproduce the issue Windows->Windows by disabling leases on the
Windows server. Disable leases using the registry key:
HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\DisableLeasing
Dochelp confirmed that this is a valid workaround for Windows clients
dropping encrypted oplock breaks.
BUG: https://bugzilla.samba.org/show_bug.cgi?id=11570
Signed-off-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Stefan Metzmacher <metze@samba.org>
Autobuild-User(master): Jeremy Allison <jra@samba.org>
Autobuild-Date(master): Sat Oct 24 05:01:32 CEST 2015 on sn-devel-104
(cherry picked from commit 0a924d13cf4bb570cce3955cf0de9d8678b37dbe)
Diffstat (limited to 'source3/smbd')
-rw-r--r-- | source3/smbd/smb2_server.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source3/smbd/smb2_server.c b/source3/smbd/smb2_server.c index 2ea997e896e..40f3f2d638c 100644 --- a/source3/smbd/smb2_server.c +++ b/source3/smbd/smb2_server.c @@ -2976,7 +2976,7 @@ NTSTATUS smbd_smb2_send_oplock_break(struct smbXsrv_connection *xconn, SBVAL(body, 0x08, op->global->open_persistent_id); SBVAL(body, 0x10, op->global->open_volatile_id); - return smbd_smb2_send_break(xconn, session, tcon, body, sizeof(body)); + return smbd_smb2_send_break(xconn, NULL, NULL, body, sizeof(body)); } NTSTATUS smbd_smb2_send_lease_break(struct smbXsrv_connection *xconn, |