On Thu, Dec 8, 2016 at 12:46 AM, Sachin Prabhu <sprabhu@xxxxxxxxxx> wrote: > If the security type specified using a mount option is not supported, > the SMB2 session setup code changes the security type to RawNTLMSSP. We > should instead fail the mount and return an error. > > Signed-off-by: Sachin Prabhu <sprabhu@xxxxxxxxxx> > --- > fs/cifs/smb2pdu.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/fs/cifs/smb2pdu.c b/fs/cifs/smb2pdu.c > index 5ca5ea46..e66fad6 100644 > --- a/fs/cifs/smb2pdu.c > +++ b/fs/cifs/smb2pdu.c > @@ -955,7 +955,8 @@ SMB2_sess_auth_rawntlmssp_authenticate(struct SMB2_sess_data *sess_data) > static int > SMB2_select_sec(struct cifs_ses *ses, struct SMB2_sess_data *sess_data) > { > - if (ses->sectype != Kerberos && ses->sectype != RawNTLMSSP) > + /* Default sec type is set to RawNTLMSSP */ > + if (ses->sectype == Unspecified) > ses->sectype = RawNTLMSSP; > > switch (ses->sectype) { > -- > 2.7.4 > > -- My initial reaction was "allow the SSP to do its thing". However, after some consideration, this is a much better way to handle this exceptional case when a user gives an explicit security type and it cannot be honored. +1, FWIW My only concern is, "will this be considered a regression by users that have (unknowingly) relied upon the previous behavior?" -- Peace and Blessings, -Scott. -- To unsubscribe from this list: send the line "unsubscribe linux-cifs" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html