diff options
Diffstat (limited to 'fs/cifs/README')
-rw-r--r-- | fs/cifs/README | 39 |
1 files changed, 32 insertions, 7 deletions
diff --git a/fs/cifs/README b/fs/cifs/README index 0355003f4f0a..7986d0d97ace 100644 --- a/fs/cifs/README +++ b/fs/cifs/README | |||
@@ -443,7 +443,10 @@ A partial list of the supported mount options follows: | |||
443 | SFU does). In the future the bottom 9 bits of the mode | 443 | SFU does). In the future the bottom 9 bits of the mode |
444 | mode also will be emulated using queries of the security | 444 | mode also will be emulated using queries of the security |
445 | descriptor (ACL). | 445 | descriptor (ACL). |
446 | sec Security mode. Allowed values are: | 446 | sign Must use packet signing (helps avoid unwanted data modification |
447 | by intermediate systems in the route). Note that signing | ||
448 | does not work with lanman or plaintext authentication. | ||
449 | sec Security mode. Allowed values are: | ||
447 | none attempt to connection as a null user (no name) | 450 | none attempt to connection as a null user (no name) |
448 | krb5 Use Kerberos version 5 authentication | 451 | krb5 Use Kerberos version 5 authentication |
449 | krb5i Use Kerberos authentication and packet signing | 452 | krb5i Use Kerberos authentication and packet signing |
@@ -453,6 +456,8 @@ sec Security mode. Allowed values are: | |||
453 | server requires signing also can be the default) | 456 | server requires signing also can be the default) |
454 | ntlmv2 Use NTLMv2 password hashing | 457 | ntlmv2 Use NTLMv2 password hashing |
455 | ntlmv2i Use NTLMv2 password hashing with packet signing | 458 | ntlmv2i Use NTLMv2 password hashing with packet signing |
459 | lanman (if configured in kernel config) use older | ||
460 | lanman hash | ||
456 | 461 | ||
457 | The mount.cifs mount helper also accepts a few mount options before -o | 462 | The mount.cifs mount helper also accepts a few mount options before -o |
458 | including: | 463 | including: |
@@ -485,14 +490,34 @@ PacketSigningEnabled If set to one, cifs packet signing is enabled | |||
485 | it. If set to two, cifs packet signing is | 490 | it. If set to two, cifs packet signing is |
486 | required even if the server considers packet | 491 | required even if the server considers packet |
487 | signing optional. (default 1) | 492 | signing optional. (default 1) |
493 | SecurityFlags Flags which control security negotiation and | ||
494 | also packet signing. Authentication (may/must) | ||
495 | flags (e.g. for NTLM and/or NTLMv2) may be combined with | ||
496 | the signing flags. Specifying two different password | ||
497 | hashing mechanisms (as "must use") on the other hand | ||
498 | does not make much sense. Default flags are | ||
499 | 0x07007 | ||
500 | (NTLM, NTLMv2 and packet signing allowed). Maximum | ||
501 | allowable flags if you want to allow mounts to servers | ||
502 | using weaker password hashes is 0x37037 (lanman, | ||
503 | plaintext, ntlm, ntlmv2, signing allowed): | ||
504 | |||
505 | may use packet signing 0x00001 | ||
506 | must use packet signing 0x01001 | ||
507 | may use NTLM (most common password hash) 0x00002 | ||
508 | must use NTLM 0x02002 | ||
509 | may use NTLMv2 0x00004 | ||
510 | must use NTLMv2 0x04004 | ||
511 | may use Kerberos security (not implemented yet) 0x00008 | ||
512 | must use Kerberos (not implemented yet) 0x08008 | ||
513 | may use lanman (weak) password hash 0x00010 | ||
514 | must use lanman password hash 0x10010 | ||
515 | may use plaintext passwords 0x00020 | ||
516 | must use plaintext passwords 0x20020 | ||
517 | (reserved for future packet encryption) 0x00040 | ||
518 | |||
488 | cifsFYI If set to one, additional debug information is | 519 | cifsFYI If set to one, additional debug information is |
489 | logged to the system error log. (default 0) | 520 | logged to the system error log. (default 0) |
490 | ExtendedSecurity If set to one, SPNEGO session establishment | ||
491 | is allowed which enables more advanced | ||
492 | secure CIFS session establishment (default 0) | ||
493 | NTLMV2Enabled If set to one, more secure password hashes | ||
494 | are used when the server supports them and | ||
495 | when kerberos is not negotiated (default 0) | ||
496 | traceSMB If set to one, debug information is logged to the | 521 | traceSMB If set to one, debug information is logged to the |
497 | system error log with the start of smb requests | 522 | system error log with the start of smb requests |
498 | and responses (default 0) | 523 | and responses (default 0) |