https://bugzilla.samba.org/show_bug.cgi?id=14713 --- Comment #39 from Richard Flint <richard.flint@xxxxxxxxx> --- Appreciate it has been sometime since this was updated but I just wanted to update this for completeness. I have tested this on Fedora 35 (5.16.9-200.fc35.x86_64) and can confirm successful negotiation of 3.0 3.0.2 and 3.1.1 with Solaris 11.4 servers both with and without encryption (as enabled by the seal parameter). E.g. the following is successful: //myserver/myshare/myfolder /mnt/myserver/myfolder cifs noauto,nounix,vers=3.1.1,seal,noserverino,ro,_netdev,noexec,nosuid,perm,nodev,iocharset=utf8,cache=strict,sec=ntlmv2,credentials=/root/password,port=445,context="system_u:object_r:myapp_content_t:s0",forceuid,forcegid,file_mode=0440,dir_mode=0550,uid=1000,gid=1001 0 0 Though noisy. E.g.: [Sat Feb 19 08:34:30 2022] CIFS: decode_ntlmssp_challenge: authentication has been weakened as server does not support key exchange [Sat Feb 19 08:34:30 2022] CIFS: VFS: \\myserver\myshare error -9 on ioctl to get interface list [Sat Feb 19 08:34:30 2022] CIFS: VFS: \\myserver\IPC$ smb2_get_dfs_refer: ioctl error: rc=-19 Intriguingly, despite specifying nounix in the mount, Wireshark shows we are still sending SMB2_POSIX_EXTENSIONS_CAPABILITY in the Negotiate Protocol Request - I'm not clear if that is the desired behaviour. The issue is still reproducible on the latest CentOS 8 Stream release, but that it works on Fedora 35 makes we wonder if an issue was fixed in the meantime that never got back-ported to CentOS 8. If that's true, then this isn't really a fault in the CIFSVFS product itself I think - or maybe it isn't anymore. -- You are receiving this mail because: You are the QA Contact for the bug.