SMB Signing and ways to get around the issue.
Server Message Blocks Protocol (SMB) is the file sharing protocol used by default on Windows-based computers. SMB 1.0 was designed for early Windows network operating systems such as Microsoft LAN Manager and Windows for Workgroups and even Server 2003. Windows Server 2008 and Vista, got a new version SMB2.
SMB Signing 1
How To Disable SMB Signing on Server 2003, SBS 2003.
Please do not try to edit the Default Domain Policy. This can be reset but this is quite a dramatic restore as it restores the Server to the state it was on AD install, and does not restore any new or user applied GPO's.
Please note that SMB signing is a security feature and that by disabling it you open the door to certain security risks. This action should be taken only when absolutely necessary.
To define SMB Signing Disabled Policy.
Instead of making changes to the Default Domain Policy to disable SMB signing, create a new Group Policy Object with the appropriate policy settings.
At the server, open Start, All Programs, Administrator Tools.
Open Group Policy Management.
Expand the forest.
Select the local domain. The group policy objects will display in the right-hand pane along with the Default Domain Policy.
Right-click the domain icon (domainname.local) in the console tree and select Create and Link a GPO Here.
Enter "SMB Signing Disabled" (without the quotations marks) for the GPO Name and click OK.
Right-click on the new GPO in the right-hand pane and select Edit to open the Group Policy Object Editor.
Under Computer Configuration, expand Windows Settings.
Expand Security Settings.
Expand Local Policies.
Select Security Options.
In the right-hand pane, scroll down to Microsoft network server: Digitally sign communications (always) and double-click on the policy object.
Select the Disabled radio button and make sure the checkbox is enabled for Define this policy setting.
Close the Group Policy Object Editor.
Right-click on the SMB Signing Disabled policy object and select Enforced. In the Linked Group Policy Objects window, the SMB Signing Disabled object should show Yes under both Enforced and Link Enabled.
Move the SMB Signing Disabled policy just above the Default Domain Policy in the window. The SMB Signing Disabled policy object should be number 5 in the list and the Default Domain Policy should be number 6 for a default SBS installation.
Open a command prompt window on the server.
Type "gpupdate /force" (without the quotation marks) and press Enter.
When the policy update completes, close the command prompt window.
SMB Signing 2
Some of the enhancements in SMB 2.0, include:
Sending multiple SMB commands in the same packet which reduces the number of packets sent between a client and server
However, while SMB 2.0 seems to do a good job if BOTH client and server OSs support it, in some cases it will slow things down. The reson for this is that the version of SMB used for file sharing is determined during the SMB session negotiation. If both the client and server support SMB 2.0, then SMB 2.0 is selected during the initial negotiation. However, if they don't both support it, SMB 1.0 will be used to in order to preserve backwards compatibility.
The SMB protocol version to be used for file operations is decided during the negotiation phase. During the negotiation phase, a Windows Vista client advertises to the server that it can understand the new SMB 2.0 protocol. If the server (Windows Server 2008 or otherwise) understands SMB 2.0, then SMB 2.0 is chosen for subsequent communication. Otherwise the client and server use SMB 1.0.
When using the terms "client" and "server" in case of file and print sharing, it does not necessarily mean that a client-type OS such as Vista "always" connects to a server-type Os such as Windows Server 2008. Sometimes, a Vista computer will connect to another Vista computer, and in that case, the computer that is "serving" the shares is considered to be the "server".
Here's how SMB is used when related to SMB versions:
When a Windows Server 2008/Vista "client" connects to a Windows Server 2008/Vista "server", SMB 2.0 is used.
When a Windows Server 2008/Vista "client" connects to a Windows 2000/XP/2003 "server", SMB 1.0 is used.
When a Windows 2000/XP/2003 "client" connects to a Windows Server 2008/Vista "server", SMB 1.0 is used.
When a Windows 2000/XP/2003 "client" connects to a Windows 2000/XP/2003 "server", SMB 1.0 is used.
So, for troubleshooting purposes, mostly in an environment that has mixes operating systems, you might want to consider disabling SMB 2.0. You need to do so on both the "client" and the "server" operating systems.
To disable SMB 2.0 for Windows Vista or Windows Server 2008 systems that are the “client” systems run the following commands:
sc config lanmanworkstation depend= bowser/mrxsmb10/nsi
sc config mrxsmb20 start= disabled
Note there's an extra " " (space) after the "=" sign.
To enable back SMB 2.0 for Windows Vista or Windows Server 2008 systems that are the “client” systems run the following commands:
sc config lanmanworkstation depend= bowser/mrxsmb10/mrxsmb20/nsi
sc config mrxsmb20 start= auto
Again, note there's an extra " " (space) after the "=" sign.
In order to disable SMB 2.0 on the server-side computer, follow these steps:
This document contains instructions for editing the registry. If you make any error while editing the registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall Windows. Edit the registry at your own risk. Always back up the registry before making any changes. If you do not feel comfortable editing the registry, do not attempt these instructions. Instead, seek the help of a trained computer specialist.
Run "regedit" on Windows Server 2008 based computer.
Expand and locate the sub tree as follows. HKLM'System'CurrentControlSet'Services'LanmanServer'Parameters
Add a new REG_DWORD key with the name of "Smb2" (without quotation mark) Value name: Smb2
Value type: REG_DWORD
0 = disabled
1 = enabledSet the value to 0 to disable SMB 2.0, or set it to 1 to re-enable SMB 2.0.
Reboot the server.