Skip to content

Conversation

@ly4k
Copy link
Contributor

@ly4k ly4k commented Oct 6, 2021

By default, SMBSERVER allows anonymous logon. For ntlmrelayx, this
is not desired since we're not interested in relaying an anonymous
session, and ntlmrelayx even skips anonymous logons. After the patch for
the PetitPotam exploit, the service now tries to logon with an anonymous
session, but if we're returning STATUS_ACCESS_DENIED, the service will
continue to NTLM authentication. This patch will create a new option for SMBSERVER
that can disable anonymous logon via config_parser/serverConfig.
Anonymous logon sessions will now return STATUS_ACCESS_DENIED.

By default, SMBSERVER allows anonymous logon. For ntlmrelayx, this
is not desired since we're not interested in relaying an anonymous
session, and ntlmrelayx even skips anonymous logons. After the patch for
the PetitPotam exploit, the service now tries to logon with an anonymous
session, but if we're returning STATUS_ACCESS_DENIED, the service will
continue to NTLM authentication. This patch will create a new option for SMBSERVER
that can disable anonymous logon via config_parser/serverConfig.
Anonymous logon sessions will now return STATUS_ACCESS_DENIED.
@0xdeaddood 0xdeaddood added the in review This issue or pull request is being analyzed label Oct 7, 2021
@0xdeaddood
Copy link
Collaborator

Hi @ly4k!

Great addition, thanks for the PR! Merging...

@0xdeaddood 0xdeaddood merged commit 1b74b06 into fortra:master Oct 21, 2021
@0xdeaddood 0xdeaddood removed the in review This issue or pull request is being analyzed label Oct 21, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants