Bug 40869 - log.samba spammed: NTLMSSP NTLM2 packet check failed due to invalid signature!
log.samba spammed: NTLMSSP NTLM2 packet check failed due to invalid signature!
Status: RESOLVED WONTFIX
Product: UCS
Classification: Unclassified
Component: Samba4
UCS 4.2
Other Linux
: P4 normal (vote)
: ---
Assigned To: Samba maintainers
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2016-03-09 13:06 CET by Arvid Requate
Modified: 2020-07-03 20:54 CEST (History)
1 user (show)

See Also:
What kind of report is it?: Development Internal
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Troubleshooting
Max CVSS v3 score:
requate: Patch_Available+


Attachments
1.patch (522 bytes, patch)
2016-03-09 13:06 CET, Arvid Requate
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2016-03-09 13:06:56 CET
Created attachment 7524 [details]
1.patch

Ticket#: 2016030821000223

In some customer environments log.samba is spammed with these messages:
========================================================================
[2016/03/06 06:34:59.587589,  0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet)
  NTLMSSP NTLM2 packet check failed due to invalid signature!
[2016/03/06 06:34:59.627542,  0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet)
  NTLMSSP NTLM2 packet check failed due to invalid signature!
[2016/03/06 06:34:59.940253,  0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet)
  NTLMSSP NTLM2 packet check failed due to invalid signature!
[2016/03/06 06:34:59.985007,  0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet)
  NTLMSSP NTLM2 packet check failed due to invalid signature!
========================================================================

According to https://lists.samba.org/archive/samba-technical/2011-January/075623.html this condition is normal. So we should definitely reduce the log level of that message from 0 to maybe 2. Patch attached.
Comment 1 Ingo Steuwer univentionstaff 2020-07-03 20:54:02 CEST
This issue has been filed against UCS 4.2.

UCS 4.2 is out of maintenance and many UCS components have changed in later releases. Thus, this issue is now being closed.

If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen it and update the UCS version. In this case please provide detailed information on how this issue is affecting you.