Skip to main content
NetApp Knowledge Base

Microsoft patch(CVE-2022-37966) forcing AES for Kerberos authentication - CIFS outage

Views:
11,473
Visibility:
Public
Votes:
14
Category:
data-ontap-8
Specialty:
7dot
Last Updated:

Applies to

  • 7-Mode
  • CIFS
  • Microsoft Server
  • CVE-2022-37966

Issue

  • Cannot connect to CIFS shares through hostname.
  • Cannot acquire new Kerberos tickets from the KDC.
  • In order to diagnose the issue, you will need to enable the trace options listed below.
  • These EMS messages will spam console and EMS after turning cifs.trace_login and cifs.trace_dc_connection options on:
 
> options cifs.trace_dc_connection on
> options cifs.trace_login on
 
Sat Nov 12 21:38:15 CST [cluster: Auth00: cifs.trace.GSSinfo:info]: AUTH: notice- Could not authenticate user.

Sat Nov 12 21:38:15 CST [cluster: Auth00: cifs.trace.GSSinfo:info]: AUTH: notice- Program lacks support for encryption type.

Sat Nov 12 21:38:15 CST [cluster: Auth00: auth.trace.authenticateUser.krbReject:info]: AUTH: Login attempt from <IP> rejected by Kerberos.

 

 

 

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.