summaryrefslogtreecommitdiff
path: root/source3/smbd
diff options
context:
space:
mode:
authorVolker Lendecke <vl@samba.org>2015-10-06 16:10:43 +0200
committerKarolin Seeger <kseeger@samba.org>2015-10-28 10:56:22 +0100
commit3abfde02f840e67dc6b416bdb3ae60ecd0b65000 (patch)
tree64b49891224ac6ef411a39be9ca9853543c78e1c /source3/smbd
parent2d39d049a902b4c7eb7cfef7224a5493c92f2e90 (diff)
downloadsamba-3abfde02f840e67dc6b416bdb3ae60ecd0b65000.tar.gz
smbd: Send SMB2 oplock breaks unencrypted
This is not what Windows server does, but it seems that Windows clients expect. Windows->Windows never runs into this issue, because an encryption-enabled SMB3 connection will always use leases, and lease breaks *are* unencrypted... You can reproduce the issue Windows->Windows by disabling leases on the Windows server. Disable leases using the registry key: HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\DisableLeasing Dochelp confirmed that this is a valid workaround for Windows clients dropping encrypted oplock breaks. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11570 Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Stefan Metzmacher <metze@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Sat Oct 24 05:01:32 CEST 2015 on sn-devel-104 (cherry picked from commit 0a924d13cf4bb570cce3955cf0de9d8678b37dbe)
Diffstat (limited to 'source3/smbd')
-rw-r--r--source3/smbd/smb2_server.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source3/smbd/smb2_server.c b/source3/smbd/smb2_server.c
index 2ea997e896e..40f3f2d638c 100644
--- a/source3/smbd/smb2_server.c
+++ b/source3/smbd/smb2_server.c
@@ -2976,7 +2976,7 @@ NTSTATUS smbd_smb2_send_oplock_break(struct smbXsrv_connection *xconn,
SBVAL(body, 0x08, op->global->open_persistent_id);
SBVAL(body, 0x10, op->global->open_volatile_id);
- return smbd_smb2_send_break(xconn, session, tcon, body, sizeof(body));
+ return smbd_smb2_send_break(xconn, NULL, NULL, body, sizeof(body));
}
NTSTATUS smbd_smb2_send_lease_break(struct smbXsrv_connection *xconn,