Activity log for bug #2027716

Date Who What changed Old value New value Message
2023-07-13 16:40:22 msaxl bug added bug
2023-07-14 11:10:47 Launchpad Janitor samba (Ubuntu): status New Confirmed
2023-07-14 11:15:34 Chris Puttick bug added subscriber Chris Puttick
2023-07-14 11:43:26 Robert Stroetgen bug added subscriber Robert Stroetgen
2023-07-14 12:13:22 Andreas Hasenack samba (Ubuntu): importance Undecided High
2023-07-14 12:13:26 Andreas Hasenack samba (Ubuntu): assignee Andreas Hasenack (ahasenack)
2023-07-14 12:13:30 Andreas Hasenack tags server-todo
2023-07-14 12:16:10 Andreas Hasenack bug watch added https://bugzilla.samba.org/show_bug.cgi?id=15418
2023-07-14 12:16:10 Andreas Hasenack bug task added samba (Debian)
2023-07-16 05:48:05 RedScourge bug added subscriber RedScourge
2023-07-16 06:12:19 Hiroaki Hashi bug added subscriber Hiroaki Hashi
2023-07-16 08:03:58 Matthew Barratt bug added subscriber Matthew Barratt
2023-07-17 09:19:52 John Edwards bug added subscriber John Edwards
2023-07-17 12:18:57 Andreas Hasenack bug added subscriber Andreas Hasenack
2023-07-17 12:20:24 Andreas Hasenack samba (Ubuntu): status Confirmed In Progress
2023-07-17 12:22:46 Andreas Hasenack bug added subscriber Ubuntu Server
2023-07-17 12:22:53 Andreas Hasenack bug added subscriber Canonical Server
2023-07-17 12:37:12 Andreas Hasenack nominated for series Ubuntu Mantic
2023-07-17 12:37:12 Andreas Hasenack bug task added samba (Ubuntu Mantic)
2023-07-17 12:59:08 Andreas Hasenack nominated for series Ubuntu Lunar
2023-07-17 12:59:08 Andreas Hasenack bug task added samba (Ubuntu Lunar)
2023-07-17 12:59:13 Andreas Hasenack samba (Ubuntu Lunar): status New In Progress
2023-07-17 12:59:15 Andreas Hasenack samba (Ubuntu Lunar): importance Undecided High
2023-07-17 13:15:35 Andreas Hasenack samba (Ubuntu Lunar): assignee Andreas Hasenack (ahasenack)
2023-07-17 13:48:13 Sebastian Chrostek bug added subscriber Sebastian Chrostek
2023-07-17 13:50:14 Andreas Hasenack nominated for series Ubuntu Kinetic
2023-07-17 13:50:14 Andreas Hasenack bug task added samba (Ubuntu Kinetic)
2023-07-17 13:50:19 Andreas Hasenack samba (Ubuntu Kinetic): status New In Progress
2023-07-17 13:50:22 Andreas Hasenack samba (Ubuntu Kinetic): importance Undecided High
2023-07-17 13:50:24 Andreas Hasenack samba (Ubuntu Kinetic): assignee Andreas Hasenack (ahasenack)
2023-07-17 14:13:32 Andreas Hasenack nominated for series Ubuntu Jammy
2023-07-17 14:13:32 Andreas Hasenack bug task added samba (Ubuntu Jammy)
2023-07-17 14:13:36 Andreas Hasenack samba (Ubuntu Jammy): status New In Progress
2023-07-17 14:13:38 Andreas Hasenack samba (Ubuntu Jammy): importance Undecided High
2023-07-17 14:13:40 Andreas Hasenack samba (Ubuntu Jammy): assignee Andreas Hasenack (ahasenack)
2023-07-17 14:16:58 Andreas Hasenack nominated for series Ubuntu Focal
2023-07-17 14:16:58 Andreas Hasenack bug task added samba (Ubuntu Focal)
2023-07-17 14:17:04 Andreas Hasenack samba (Ubuntu Focal): status New In Progress
2023-07-17 14:17:09 Andreas Hasenack samba (Ubuntu Focal): importance Undecided High
2023-07-17 14:17:11 Andreas Hasenack samba (Ubuntu Focal): assignee Andreas Hasenack (ahasenack)
2023-07-17 19:29:10 Peter Meiser bug added subscriber Peter Meiser
2023-07-17 20:02:45 Tim Ingles bug added subscriber Tim Ingles
2023-07-18 12:01:08 Rini van Zetten bug added subscriber Rini van Zetten
2023-07-18 12:48:16 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447094
2023-07-18 19:59:09 Alex bug added subscriber Alex
2023-07-19 10:26:47 Miguel Lorenzo Amarelle bug added subscriber Miguel Lorenzo Amarelle
2023-07-19 19:09:47 RedScourge cve linked 2022-37966
2023-07-19 19:24:36 RedScourge cve linked 2022-26931
2023-07-19 19:32:49 Mitchell Potier removed subscriber Mitchell Potier
2023-07-19 23:56:57 Eli Navarro bug added subscriber Eli Navarro
2023-07-20 12:59:15 krbvroc1 bug added subscriber krbvroc1
2023-07-20 13:17:29 Launchpad Janitor merge proposal unlinked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447094
2023-07-20 16:26:19 Raydel Govea bug added subscriber Raydel Govea
2023-07-20 20:13:40 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447347
2023-07-21 13:06:37 Andreas Hasenack merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447094
2023-07-21 14:08:16 Andreas Hasenack description This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ] * An explanation of the effects of the bug on users and * justification for backporting the fix to the stable release. * In addition, it is helpful, but not required, to include an explanation of how the upload fixes this bug. [ Test Plan ] * detailed instructions how to reproduce the bug * these should allow someone who is not familiar with the affected package to reproduce the bug and verify that the updated package fixes the problem. * if other testing is appropriate to perform before landing this update, this should also be described here. [ Where problems could occur ] * Think about what the upload changes in the software. Imagine the change is wrong or breaks something else: how would this show up? * It is assumed that any SRU candidate patch is well-tested before upload and has a low overall risk of regression, but it's important to make the effort to think about what ''could'' happen in the event of a regression. * This must '''never''' be "None" or "Low", or entirely an argument as to why your upload is low risk. * This both shows the SRU team that the risks have been considered, and provides guidance to testers in regression-testing the SRU. [ Other Info ] * Anything else you think is useful to include * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:28:27 Andreas Hasenack description [ Impact ] * An explanation of the effects of the bug on users and * justification for backporting the fix to the stable release. * In addition, it is helpful, but not required, to include an explanation of how the upload fixes this bug. [ Test Plan ] * detailed instructions how to reproduce the bug * these should allow someone who is not familiar with the affected package to reproduce the bug and verify that the updated package fixes the problem. * if other testing is appropriate to perform before landing this update, this should also be described here. [ Where problems could occur ] * Think about what the upload changes in the software. Imagine the change is wrong or breaks something else: how would this show up? * It is assumed that any SRU candidate patch is well-tested before upload and has a low overall risk of regression, but it's important to make the effort to think about what ''could'' happen in the event of a regression. * This must '''never''' be "None" or "Low", or entirely an argument as to why your upload is low risk. * This both shows the SRU team that the risks have been considered, and provides guidance to testers in regression-testing the SRU. [ Other Info ] * Anything else you think is useful to include * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ]  * An explanation of the effects of the bug on users and  * justification for backporting the fix to the stable release.  * In addition, it is helpful, but not required, to include an    explanation of how the upload fixes this bug. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command: Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False", indicating the presence of the bug. With the samba AD DC controller patched with this update, the output will be "True". b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:31:29 Andreas Hasenack description [ Impact ]  * An explanation of the effects of the bug on users and  * justification for backporting the fix to the stable release.  * In addition, it is helpful, but not required, to include an    explanation of how the upload fixes this bug. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command: Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False", indicating the presence of the bug. With the samba AD DC controller patched with this update, the output will be "True". b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ]  * An explanation of the effects of the bug on users and  * justification for backporting the fix to the stable release.  * In addition, it is helpful, but not required, to include an    explanation of how the upload fixes this bug. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False", indicating the presence of the bug. With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. PS C:\Users\ubuntu> b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:35:05 Andreas Hasenack description [ Impact ]  * An explanation of the effects of the bug on users and  * justification for backporting the fix to the stable release.  * In addition, it is helpful, but not required, to include an    explanation of how the upload fixes this bug. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False", indicating the presence of the bug. With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. PS C:\Users\ubuntu> b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ]  * An explanation of the effects of the bug on users and  * justification for backporting the fix to the stable release.  * In addition, it is helpful, but not required, to include an    explanation of how the upload fixes this bug. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:45:01 Andreas Hasenack description [ Impact ]  * An explanation of the effects of the bug on users and  * justification for backporting the fix to the stable release.  * In addition, it is helpful, but not required, to include an    explanation of how the upload fixes this bug. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ] Windows update KB5028166[1] broke the secure channel in trust relationships between windows workstations and samba domain controllers. This manifests itself in widespread domain users authentication problems, including remote desktop access. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:47:49 Andreas Hasenack description [ Impact ] Windows update KB5028166[1] broke the secure channel in trust relationships between windows workstations and samba domain controllers. This manifests itself in widespread domain users authentication problems, including remote desktop access. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ] Windows update KB5028166[1] broke the secure channel in trust relationships between windows workstations and samba domain controllers. This manifests itself in widespread domain users authentication problems, most notably remote desktop access. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:54:04 Andreas Hasenack description [ Impact ] Windows update KB5028166[1] broke the secure channel in trust relationships between windows workstations and samba domain controllers. This manifests itself in widespread domain users authentication problems, most notably remote desktop access. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ]  * Think about what the upload changes in the software. Imagine the change is    wrong or breaks something else: how would this show up?  * It is assumed that any SRU candidate patch is well-tested before    upload and has a low overall risk of regression, but it's important    to make the effort to think about what ''could'' happen in the    event of a regression.  * This must '''never''' be "None" or "Low", or entirely an argument as to why    your upload is low risk.  * This both shows the SRU team that the risks have been considered,    and provides guidance to testers in regression-testing the SRU. [ Other Info ]  * Anything else you think is useful to include  * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board  * and address these questions in advance [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases [ Impact ] Windows update KB5028166[1] broke the secure channel in trust relationships between windows workstations and samba domain controllers. This manifests itself in widespread domain users authentication problems, most notably remote desktop access. [ Test Plan ] This testplan requires a windows 10 or 11 machine joined to a samba AD DC controller. Windows should be fully up-do-date. In particular, KB5028166[1] must be installed. There are two test cases described here: a simple one, with a very specific check that requires just one command on the windows powershell interface, and a more elaborate one that contains a user story involving remote desktop. a) Test Secure Channel between windows and the domain controller[2] - open a powershell window - run this command:   Test-ComputerSecureChannel -Verbose With an unpatched samba AD DC controller, the output of the above command will be "False" and report a broken secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". False VERBOSE: The secure channel between the local computer and the domain samba.example is broken. """ With the samba AD DC controller patched with this update, the output will be "True" and report a good secure channel: """ Windows PowerShell Copyright (C) Microsoft Corporation. All rights reserved. Try the new cross-platform PowerShell https://aka.ms/pscore6 PS C:\Users\ubuntu> Test-ComputerSecureChannel -Verbose VERBOSE: Performing the operation "Test-ComputerSecureChannel" on target "win11". True VERBOSE: The secure channel between the local computer and the domain samba.example is in good condition. """ b) Access the windows machine via remote desktop - on the windows machine, enable remote desktop services for the domain users. Be sure to allow it for the user you want to use for the test. Also make sure NLA (Network Level Authentication) is enabled (it's the default, but check) - logout from windows - from another ubuntu system that can reach the windows machine on port 3389, and it doesn't have to have any relationship with the domain, install vinagre: sudo apt install vinagre - Launch it from the terminal (not the desktop launcher). We want to see its log messates, and they will show up in the terminal it was launched from. - click connect, select the RDP protocol, and type in the IP of the windows machine and the domain user credentials With an unpatched samba AD DC controller, the connection will fail, and the terminal where vinagre was launched from will print this error message: [11:02:48:250] [2029009:2029009] [WARN][com.freerdp.core.nla] - SPNEGO received NTSTATUS: STATUS_TRUSTED_RELATIONSHIP_FAILURE [0xC000018D] from server The key here is that the trust relationship is broken. - With a patched samba AD DC controller, the remote desktop connection will accept the credentials and work. 1. https://support.microsoft.com/en-us/topic/july-11-2023-kb5028166-os-builds-19044-3208-and-19045-3208-eab49ea6-3133-41c8-845f-a14a329c6c20 2. https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/test-computersecurechannel?view=powershell-5.1 [ Where problems could occur ] The patches went through some iterations, but have stabilized now and are committed to samba upstream. There is more work to be done (https://bugzilla.samba.org/show_bug.cgi?id=15425), but the more urgent fix is what is presented here and in the latest samba upstream releases. Problems that can happen here are, in no particular order: - break domain trust entirely - Microsoft publishes another patch in reaction to this which changes behavior once again - more follow-up fixes are necessary [ Other Info ] Given the urgency of this fix, I published a PPA and this bug report has comments stating that real life deployments were fixed by this update. [Original Description] This bug is just a reminder/link to upstream bug https://bugzilla.samba.org/show_bug.cgi?id=15418 The impact of this issue is that a windows 10/11 machine joined to a samba ad dc domain will not allow ntlm based logins (ex. freerdp, shared folders on the windows 10 machine) using domain accounts There is already a solution to this problem. The importance is tagged as critical, so I guess a possible fix will land in master soon. For ubuntu we will very probably need a sru for all supported lts releases
2023-07-21 14:56:02 Andreas Hasenack bug watch added https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041043
2023-07-21 14:56:02 Andreas Hasenack samba (Debian): remote watch Samba Bugzilla #15418 Debian Bug tracker #1041043
2023-07-21 14:56:21 Andreas Hasenack bug task added samba
2023-07-22 06:15:37 Matthew Barratt bug watch added https://bugzilla.samba.org/show_bug.cgi?id=15425
2023-07-23 20:30:35 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447459
2023-07-23 20:32:52 Launchpad Janitor merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447460
2023-07-24 08:42:28 Vasili Belkin bug added subscriber Vasili Belkin
2023-07-25 20:12:41 Lucas Kanashiro samba (Ubuntu Kinetic): status In Progress Won't Fix
2023-07-26 19:35:00 Launchpad Janitor merge proposal unlinked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447460
2023-07-26 19:38:53 Andreas Hasenack merge proposal linked https://code.launchpad.net/~ahasenack/ubuntu/+source/samba/+git/samba/+merge/447460
2023-07-27 01:29:10 Launchpad Janitor samba (Ubuntu Mantic): status In Progress Fix Released
2023-07-28 10:05:10 Timo Aaltonen samba (Ubuntu Lunar): status In Progress Fix Committed
2023-07-28 10:05:11 Timo Aaltonen bug added subscriber Ubuntu Stable Release Updates Team
2023-07-28 10:05:15 Timo Aaltonen bug added subscriber SRU Verification
2023-07-28 10:05:20 Timo Aaltonen tags server-todo server-todo verification-needed verification-needed-lunar
2023-07-29 19:08:38 Steven Westbrook bug added subscriber Steven Westbrook
2023-07-31 05:26:32 Mirco Vivaldi bug added subscriber Mirco Vivaldi
2023-07-31 11:07:12 John Hainsworth samba (Ubuntu Jammy): status In Progress Fix Committed
2023-07-31 11:07:15 John Hainsworth samba (Ubuntu Jammy): status Fix Committed In Progress
2023-07-31 18:18:20 Andreas Hasenack tags server-todo verification-needed verification-needed-lunar server-todo verification-done-lunar verification-needed
2023-07-31 19:25:14 Bradley Forney bug added subscriber Bradley Forney
2023-07-31 23:58:28 Dara Poon bug added subscriber Dara Poon
2023-08-01 11:07:32 Davide Principi bug added subscriber Davide Principi
2023-08-02 09:32:01 Péter Molnár bug added subscriber Péter Molnár
2023-08-02 16:48:55 Robie Basak samba (Ubuntu Jammy): status In Progress Fix Committed
2023-08-02 16:49:01 Robie Basak tags server-todo verification-done-lunar verification-needed server-todo verification-done-lunar verification-needed verification-needed-jammy
2023-08-02 16:49:25 Robie Basak samba (Ubuntu Focal): status In Progress Fix Committed
2023-08-02 16:49:31 Robie Basak tags server-todo verification-done-lunar verification-needed verification-needed-jammy server-todo verification-done-lunar verification-needed verification-needed-focal verification-needed-jammy
2023-08-02 19:15:32 Andreas Hasenack removed subscriber Andreas Hasenack
2023-08-02 19:15:35 Andreas Hasenack bug added subscriber Andreas Hasenack
2023-08-02 19:50:46 Andreas Hasenack attachment added setup-dc.sh https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2027716/+attachment/5690070/+files/setup-dc.sh
2023-08-02 19:51:18 Andreas Hasenack tags server-todo verification-done-lunar verification-needed verification-needed-focal verification-needed-jammy server-todo verification-done-jammy verification-done-lunar verification-needed verification-needed-focal
2023-08-02 20:16:02 Andreas Hasenack tags server-todo verification-done-jammy verification-done-lunar verification-needed verification-needed-focal server-todo verification-done-focal verification-done-jammy verification-done-lunar verification-needed
2023-08-05 16:36:07 Maciej Gołuchowski samba (Ubuntu Jammy): status Fix Committed Fix Released
2023-08-06 20:21:19 Andreas Hasenack samba (Ubuntu Jammy): status Fix Released Fix Committed
2023-08-08 19:48:16 Brian Murray removed subscriber Ubuntu Stable Release Updates Team
2023-08-08 19:49:09 Launchpad Janitor samba (Ubuntu Lunar): status Fix Committed Fix Released
2023-08-09 09:34:10 Frank Rochlitzer bug added subscriber Frank Rochlitzer
2023-08-10 18:15:10 XanderCDN bug added subscriber XanderCDN
2023-08-15 17:17:56 Launchpad Janitor samba (Ubuntu Jammy): status Fix Committed Fix Released
2023-08-15 17:18:41 Launchpad Janitor samba (Ubuntu Focal): status Fix Committed Fix Released
2023-09-03 23:12:54 Bug Watch Updater samba (Debian): status Unknown Fix Released
2023-09-05 20:25:04 Lexa attachment added 2023-09-05 16_24_17-CompatWindow.png https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2027716/+attachment/5697786/+files/2023-09-05%2016_24_17-CompatWindow.png