CIFS: Enable encryption for SMB3
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Medium
|
Tim Gardner | ||
Xenial |
Fix Released
|
Medium
|
Joseph Salisbury | ||
Yakkety |
Fix Released
|
Medium
|
Joseph Salisbury | ||
Zesty |
Fix Released
|
Medium
|
Tim Gardner |
Bug Description
There has been work upstream to enable encryption support for SMB3 connections. This is a particularly valuable (and commonly requested) feature with the Azure Files service as encryption is required to connect to an Azure Files storage share from on-prem or from a different Azure region.
The relevant commits are as follows:
CIFS: Fix possible use after free in demultiplex thread
Commit 61cfac6f267dabc
CIFS: Allow to switch on encryption with seal mount option
Commit ae6f8dd4d0c87bf
CIFS: Add capability to decrypt big read responses
Commit c42a6abe3012832
CIFS: Decrypt and process small encrypted packets
Commit 4326ed2f6a16ae9
CIFS: Add copy into pages callback for a read operation
Commit d70b9104b1ca586
CIFS: Add mid handle callback
Commit 9b7c18a2d4b7989
CIFS: Add transform header handling callbacks
Commit 9bb17e0916a03ab
CIFS: Encrypt SMB3 requests before sending
Commit 026e93dc0a3eefb
CIFS: Enable encryption during session setup phase
Commit cabfb3680f78981
CIFS: Add capability to transform requests before sending
Commit 7fb8986e7449d0a
CIFS: Separate RFC1001 length processing for SMB2 read
Commit b8f57ee8aad414a
CIFS: Separate SMB2 sync header processing
Commit cb200bd6264a80c
CIFS: Send RFC1001 length in a separate iov
Commit 738f9de5cdb9175
CIFS: Make send_cancel take rqst as argument
Commit fb2036d817584df
CIFS: Make SendReceive2() takes resp iov
Commit da502f7df03d2d0
CIFS: Separate SMB2 header structure
Commit 31473fc4f9653b7
cifs: Add soft dependencies
Commit b9be76d585d48cb
cifs: Only select the required crypto modules
Commit 3692304bba6164b
cifs: Simplify SMB2 and SMB311 dependencies
Commit c1ecea87471bbb6
CVE References
Changed in linux (Ubuntu Zesty): | |
assignee: | nobody → Tim Gardner (timg-tpi) |
status: | Confirmed → Fix Committed |
Changed in linux (Ubuntu Yakkety): | |
status: | New → Confirmed |
Changed in linux (Ubuntu Zesty): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Yakkety): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Xenial): | |
importance: | Undecided → Medium |
tags: | added: kernel-da-key kernel-hyper-v |
Changed in linux (Ubuntu Xenial): | |
assignee: | nobody → Joseph Salisbury (jsalisbury) |
Changed in linux (Ubuntu Yakkety): | |
assignee: | nobody → Joseph Salisbury (jsalisbury) |
status: | Confirmed → In Progress |
Changed in linux (Ubuntu Xenial): | |
status: | Confirmed → In Progress |
Changed in linux (Ubuntu Yakkety): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Xenial): | |
status: | In Progress → Fix Committed |
tags: |
added: verification-failed-xenial removed: verification-needed-xenial |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1670508
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.