Univention Bugzilla – Bug 40869
log.samba spammed: NTLMSSP NTLM2 packet check failed due to invalid signature!
Last modified: 2020-07-03 20:54:02 CEST
Created attachment 7524 [details] 1.patch Ticket#: 2016030821000223 In some customer environments log.samba is spammed with these messages: ======================================================================== [2016/03/06 06:34:59.587589, 0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet) NTLMSSP NTLM2 packet check failed due to invalid signature! [2016/03/06 06:34:59.627542, 0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet) NTLMSSP NTLM2 packet check failed due to invalid signature! [2016/03/06 06:34:59.940253, 0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet) NTLMSSP NTLM2 packet check failed due to invalid signature! [2016/03/06 06:34:59.985007, 0, pid=3678] ../auth/ntlmssp/ntlmssp_sign.c:236(ntlmssp_check_packet) NTLMSSP NTLM2 packet check failed due to invalid signature! ======================================================================== According to https://lists.samba.org/archive/samba-technical/2011-January/075623.html this condition is normal. So we should definitely reduce the log level of that message from 0 to maybe 2. Patch attached.
This issue has been filed against UCS 4.2. UCS 4.2 is out of maintenance and many UCS components have changed in later releases. Thus, this issue is now being closed. If this issue still occurs in newer UCS versions, please use "Clone this bug" or reopen it and update the UCS version. In this case please provide detailed information on how this issue is affecting you.