diff options
author | Steve French <sfrench@us.ibm.com> | 2008-08-28 17:30:06 +0200 |
---|---|---|
committer | Steve French <sfrench@us.ibm.com> | 2008-08-28 17:30:06 +0200 |
commit | 2e655021b8d50b5d90ce442f3de6bf3667729910 (patch) | |
tree | 554a083b1d32f25b8c14a2e4929c17cb09f23670 /fs/cifs/README | |
parent | cifs: fix O_APPEND on directio mounts (diff) | |
download | linux-2e655021b8d50b5d90ce442f3de6bf3667729910.tar.xz linux-2e655021b8d50b5d90ce442f3de6bf3667729910.zip |
[CIFS] update cifs change log
Signed-off-by: Steve French <sfrench@us.ibm.com>
Diffstat (limited to '')
-rw-r--r-- | fs/cifs/README | 14 |
1 files changed, 12 insertions, 2 deletions
diff --git a/fs/cifs/README b/fs/cifs/README index 68b5c1169d9d..bd2343d4c6a6 100644 --- a/fs/cifs/README +++ b/fs/cifs/README @@ -542,10 +542,20 @@ SecurityFlags Flags which control security negotiation and hashing mechanisms (as "must use") on the other hand does not make much sense. Default flags are 0x07007 - (NTLM, NTLMv2 and packet signing allowed). Maximum + (NTLM, NTLMv2 and packet signing allowed). The maximum allowable flags if you want to allow mounts to servers using weaker password hashes is 0x37037 (lanman, - plaintext, ntlm, ntlmv2, signing allowed): + plaintext, ntlm, ntlmv2, signing allowed). Some + SecurityFlags require the corresponding menuconfig + options to be enabled (lanman and plaintext require + CONFIG_CIFS_WEAK_PW_HASH for example). Enabling + plaintext authentication currently requires also + enabling lanman authentication in the security flags + because the cifs module only supports sending + laintext passwords using the older lanman dialect + form of the session setup SMB. (e.g. for authentication + using plain text passwords, set the SecurityFlags + to 0x30030): may use packet signing 0x00001 must use packet signing 0x01001 |