Hi Kacper:
I don’t support products, which means I don’t help customer configure systems. 
As such, please elaborate on the following as I have never done this.
3) Create new GPO with user settings, say with a mapped drive

As for mutual authentication, it is not related to integrity and privacy.
Mutual authentication means that only Kerberos can be used for authentication 
(mutual authentication means that not only server will authenticate client, 
client will also authenticate server). NTLM cannot do mutual authentication.

Session key is always established whether you do mutual authentication or not.


Regards,
Obaid Farooqi
Sr. Escalation Engineer | Microsoft

From: Kacper <[email protected]>
Sent: Friday, December 12, 2025 12:34 PM
To: Obaid Farooqi <[email protected]>
Cc: Microsoft Support <[email protected]>; cifs-protocol 
<[email protected]>
Subject: Re: [EXTERNAL] Re: Windows 11 does not appear to apply group policies 
on logon when Hardened UNC paths are configured - TrackingID#2512040040010550

Hi Obaid,

I’ve done some additional testing. When I set RequireMutualAuthentication=0 
while keeping RequireIntegrity=1 and RequirePrivacy=1, Windows does not fail 
the signature verification. My understanding is that mutual authentication is 
required to establish a session key, which is then used to enable integrity 
(signing) and privacy (encryption).
If that’s the case, then integrity and privacy shouldn’t work when mutual 
authentication is disabled—correct? In other words, RequireMutualAuthentication 
would need to be enabled in order to use either integrity or privacy?

Additionally, I tested this scenario on Windows 10 22H2, and the issue does not 
occur there.

To reproduce the issue;
1) Provision a Samba DC and create a new domain
3) Join a Windows 11 client to the Samba domain
2) Create a GPO, preferably using RSAT, and configure the setting "Hardened UNC 
paths" with RequireMutualAuthentication=1, RequireIntegrity=1, RequirePrivacy=1 
(Computer Configuration → Administrative Templates → Network → Network Provider 
→ Hardened UNC Paths)
3) Create new GPO with user settings, say with a mapped drive
4) Create a new user, either using RSAT or samba-tool user create, and set a 
known password for the user
5) Logon with that user on the Windows 11 client
6) The mapped drive does not get mapped, no group policies have been applied 
during logon and the Windows event log will log an event with event id 1058, 
error code 2148073478 and the description invalid signature
7) running gpupdate /force manually will apply policies for both computer and 
user without errors

Regards,
Kacper

On Fri, 12 Dec 2025 at 16:41, Kacper 
<[email protected]<mailto:[email protected]>> wrote:
Hi Obaid,

I'm using the Group Policy Management Console (GPMC) snap-in. I'm configuring 
hardened UNC paths for \\*\NETLOGON<file://*/NETLOGON> and 
\\*\SYSVOL<file://*/SYSVOL>. I've uploaded a screenshot of the GPO setting to 
the secure file exchange.

Regards,
Kacper

On Fri, 12 Dec 2025 at 01:32, Obaid Farooqi 
<[email protected]<mailto:[email protected]>> wrote:
Hi Kacper:
How are you applying this group policy on a Samba DC? If you are doing it on a 
Windows DC, what is the UNC path that you are configuring in the group policy 
editor?


Regards,
Obaid Farooqi
Sr. Escalation Engineer | Microsoft

From: Kacper <[email protected]<mailto:[email protected]>>
Sent: Thursday, December 11, 2025 4:59 PM
To: Obaid Farooqi <[email protected]<mailto:[email protected]>>
Cc: Microsoft Support 
<[email protected]<mailto:[email protected]>>; cifs-protocol 
<[email protected]<mailto:[email protected]>>
Subject: Re: [EXTERNAL] Re: Windows 11 does not appear to apply group policies 
on logon when Hardened UNC paths are configured - TrackingID#2512040040010550

Hi Obaid,

If session setup responses are always signed I would like to understand why the 
signature verification fails when Hardened UNC Paths are configured with 
RequireMutualAuthentication=1, RequireIntegrity=1, RequirePrivacy=1 (Computer 
Configuration → Administrative Templates → Network → Network Provider → 
Hardened UNC Paths) and why the signature verification succeeds
1) when Hardened UNC Paths are not configured (e.g. the gpo is left at its not 
configured setting)
2) after logon when manually refreshing group policies with gpupdate /force.

Regards,
Kacper

On Thu, Dec 11, 2025, 20:34 Obaid Farooqi 
<[email protected]<mailto:[email protected]>> wrote:
Hi Kacper:
Looking at the traces, here is what’s happening:

  1.  Just before sending the create request for gpt.ini, client determines 
that it is a 3-part SPN and there fore it needs to reauthenticate.
  2.  Client sends a session setup request
  3.  Server (in this case Samba DC) responds with session set up response
  4.  Session set up response is always signed. Client tries to verify the 
signature and that fails.

Please let me know if this does not answer your question.

Regards,
Obaid Farooqi
Sr. Escalation Engineer | Microsoft

From: Kacper <[email protected]<mailto:[email protected]>>
Sent: Wednesday, December 10, 2025 4:30 AM
To: Obaid Farooqi <[email protected]<mailto:[email protected]>>
Cc: Microsoft Support 
<[email protected]<mailto:[email protected]>>; cifs-protocol 
<[email protected]<mailto:[email protected]>>
Subject: Re: [EXTERNAL] Re: Windows 11 does not appear to apply group policies 
on logon when Hardened UNC paths are configured - TrackingID#2512040040010550

Hi Obaid,

I have not been able to reproduce this problem against a Windows DC. I've 
uploaded the requested t.cmd traces to the secure file exchange.

Regards,
Kacper

On Tue, 9 Dec 2025 at 21:13, Obaid Farooqi 
<[email protected]<mailto:[email protected]>> wrote:
Hi Kacper:
You’ll have to rename t.txt to t.cmd. Your email provider does not allow .cmd 
files.

Regards,
Obaid Farooqi
Sr. Escalation Engineer | Microsoft

From: Obaid Farooqi
Sent: Tuesday, December 9, 2025 2:10 PM
To: 'Kacper' <[email protected]<mailto:[email protected]>>
Cc: Microsoft Support 
<[email protected]<mailto:[email protected]>>; 'cifs-protocol' 
<[email protected]<mailto:[email protected]>>
Subject: RE: [EXTERNAL] Re: Windows 11 does not appear to apply group policies 
on logon when Hardened UNC paths are configured - TrackingID#2512040040010550


Hi Kacper:
I want to reproduce this for Windows to Windows. Please let me know the exact 
steps and set up.

Alternatively, you can collect ETW traces for me on the Windows 11 client. The 
script I have attached to this email does not survive reboot. So, if you can 
reproduce the scenario without rebooting, here are the steps.


  1.  Unzip and copy the file t.cmd on your windows 11 client.
  2.  Login as administrator and in a cmd (elevated), execute the following 
command:
>t.cmd clion
  3.  Reproduce the scenario, which I guess will require you to log off and 
login again (preferably as a different user)
  4.  Once you see the error in Event Viewer, repro is complete.
  5.  Open an elevated Cmd window and execute the following command:
>t.cmd clioff
  6.  Upload the resulting t*.cab file to the link I provided you.

Regards,
Obaid Farooqi
Sr. Escalation Engineer | Microsoft

From: Obaid Farooqi
Sent: Monday, December 8, 2025 10:38 AM
To: 'Kacper' <[email protected]<mailto:[email protected]>>
Cc: Microsoft Support 
<[email protected]<mailto:[email protected]>>; cifs-protocol 
<[email protected]<mailto:[email protected]>>
Subject: RE: [EXTERNAL] Re: Windows 11 does not appear to apply group policies 
on logon when Hardened UNC paths are configured - TrackingID#2512040040010550

Hi Kacper:
Thank you for the traces. I’ll look into them and get back to you as soon as I 
have anything conceret.
Regards,
Obaid Farooqi
Sr. Escalation Engineer | Microsoft

From: Kacper <[email protected]<mailto:[email protected]>>
Sent: Monday, December 8, 2025 4:20 AM
To: Obaid Farooqi <[email protected]<mailto:[email protected]>>
Cc: Microsoft Support 
<[email protected]<mailto:[email protected]>>; cifs-protocol 
<[email protected]<mailto:[email protected]>>
Subject: [EXTERNAL] Re: Windows 11 does not appear to apply group policies on 
logon when Hardened UNC paths are configured - TrackingID#2512040040010550

Hello Obaid,

Thank you for taking over this issue. The issue occurs between a Windows 11 
client and a Samba DC. I’ve tested the same scenario against a Windows DC, and 
it works correctly there.
My testing was done with Windows 11 (24H2, OS version 26100.7171) and Samba 
4.21.10. I’ve uploaded the network trace, the event log entry, and the auth 
trace.
Manually running gpupdate /force after the user logs on works without any 
issues.

I would like to understand why Windows fails to apply GPOs during logon when 
Hardened UNC Paths are configured and the domain controller is Samba.

Regards,
Kacper
_______________________________________________
cifs-protocol mailing list
[email protected]
https://lists.samba.org/mailman/listinfo/cifs-protocol

Reply via email to